Sciweavers

1821 search results - page 210 / 365
» Security-Aware Program Transformations
Sort
View
TWC
2010
13 years 4 months ago
Delay-Minimal Transmission for Average Power Constrained Multi-Access Communications
We investigate the problem of minimizing the overall transmission delay of packets in a multi-access wireless communication system, where the transmitters have average power constr...
Jing Yang, Sennur Ulukus
TON
2012
12 years 1 days ago
Some Fundamental Results on Base Station Movement Problem for Wireless Sensor Networks
—The benefits of using mobile base station to prolong sensor network lifetime have been well recognized. However, due to the complexity of the problem (time-dependent network to...
Yi Shi, Y. Thomas Hou
SCAM
2006
IEEE
14 years 3 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
PLDI
2006
ACM
14 years 3 months ago
Correctness-preserving derivation of concurrent garbage collection algorithms
Constructing correct concurrent garbage collection algorithms is notoriously hard. Numerous such algorithms have been proposed, implemented, and deployed – and yet the relations...
Martin T. Vechev, Eran Yahav, David F. Bacon
ICSM
2005
IEEE
14 years 3 months ago
Appletizing: Running Legacy Java Code Remotely from a Web Browser
Adding distributed capabilities to existing programs has come to the forefront of software evolution. As a standard Java distributed technology, applets offer the advantages of be...
Eli Tilevich, Yannis Smaragdakis, Marcus Handte