Sciweavers

761 search results - page 124 / 153
» Reverse engineering MAC
Sort
View
CAISE
2005
Springer
14 years 1 months ago
A MDA-Compliant Environment for Developing User Interfaces of Information Systems
Abstract. To cope with the ever increasing diversity of markup languages, programming languages, tool kits and interface development environments, conceptual modeling of user inter...
Jean Vanderdonckt
SIGADA
2005
Springer
14 years 1 months ago
Data sharing between ada and C/C++
The En Route Automation Modernization (ERAM) program is a real-time Air Traffic Control (ATC) program being developed by Lockheed Martin Corporation. The ERAM program has high ava...
Matt Mark
DRM
2004
Springer
14 years 1 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
IH
2004
Springer
14 years 1 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
INFOVIS
2003
IEEE
14 years 1 months ago
Multiscale Visualization of Small World Networks
Many networks under study in Information Visualization are “small world” networks. These networks first appeared in the study social networks and were shown to be relevant mod...
David Auber, Yves Chiricota, Fabien Jourdan, Guy M...