Sciweavers

11603 search results - page 2269 / 2321
» Securing Embedded Systems
Sort
View
TBILLC
2005
Springer
14 years 1 months ago
Case Attraction in Ancient Greek
Case attraction has stood as a puzzling, and elusive, oddity of older Indo-European languages. This paper focuses on attraction in Ancient Greek, establishing both the regularity o...
Scott Grimm
OOPSLA
2004
Springer
14 years 1 months ago
AJEER: an aspectJ-enabled eclipse runtime
There are a number of technologies designed to improve modularity in software systems. The technique presented here combines two of them seamlessly to exploit their respective ben...
Martin Lippert
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
14 years 29 days ago
Efficacy and Sustainability of a Telerehabilitation Program
Efficacy and Sustainability of a Telerehabilitation Program Sustainability and appropriateness of care are important components for healthcare systems as they begin integrating te...
Cynthia Scheideman-Miller, Pamela G. Clark, Al Moo...
INFOCOM
2003
IEEE
14 years 29 days ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
14 years 13 hour ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
« Prev « First page 2269 / 2321 Last » Next »