Sciweavers

416 search results - page 10 / 84
» Some new approaches for preventing software tampering
Sort
View
OOPSLA
2001
Springer
13 years 12 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
JCS
2011
91views more  JCS 2011»
13 years 2 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
ICWS
2009
IEEE
14 years 4 months ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: © Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
SELMAS
2004
Springer
14 years 23 days ago
Composition of a New Process to Meet Agile Needs Using Method Engineering
The need of developing a new software engineering process (SEP) that could allow the quick prototyping of some robotic applications and meet the requests coming from some companie...
Massimo Cossentino, Valeria Seidita
CIBCB
2008
IEEE
14 years 1 months ago
Discovering novel cancer therapies: A computational modeling and search approach
— Solid tumors must recruit new blood vessels for growth and maintenance. Discovering drugs that block this tumor-induced development of new blood vessels (angiogenesis) is an im...
Arthur W. Mahoney, Brian G. Smith, Nicholas S. Fla...