Sciweavers

331 search results - page 56 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
TRUST
2010
Springer
14 years 14 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
TASE
2011
IEEE
13 years 2 months ago
A Totally Decoupled Piezo-Driven XYZ Flexure Parallel Micropositioning Stage for Micro/Nanomanipulation
—This paper reports the design and development processes of a totally decoupled flexure-based XYZ parallel-kinematics micropositioning stage with piezoelectric actuation. The un...
Yangmin Li, Qingsong Xu
INFSOF
2002
72views more  INFSOF 2002»
13 years 7 months ago
Multi-item auctions for automatic negotiation
Available resources can often be limited with regard to the number of demands. In this paper we propose an approach for solving this problem which consists of using the mechanisms...
Houssein Benameur, Brahim Chaib-draa, Peter G. Kro...
EUROSYS
2010
ACM
14 years 15 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero