Sciweavers

206 search results - page 23 / 42
» Remote Code Execution on Ubiquitous Mobile Applications
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
EWSA
2004
Springer
14 years 29 days ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
ICDCSW
2008
IEEE
14 years 2 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
HPDC
1993
IEEE
13 years 11 months ago
Supporting Heterogeneity and Distribution in the Numerical Propulsion System
The Numerical Propulsion System Simulation (NPSS) project has been initiated by NASA to explore the use of computer simulation in the development of new aircraft propulsion techno...
Patrick T. Homer, Richard D. Schlichting
JPDC
2006
83views more  JPDC 2006»
13 years 7 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit