Sciweavers

1150 search results - page 130 / 230
» Specifying Information-Flow Controls
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
CISS
2007
IEEE
14 years 2 months ago
Wireless Multicasting with Channel Uncertainty
— We consider wireless multicasting where a source of common information is transmitted to a group of receivers over block fading channels. Communication between the transmitter ...
Jie Luo, Anthony Ephremides
FDL
2007
IEEE
14 years 2 months ago
Automatic High Level Assertion Generation and Synthesis for Embedded System Design
SystemVerilog encapsulates both design description and verification properties in one language and provides a unified environment for engineers who have the formidable challenge o...
Lun Li, Frank P. Coyle, Mitchell A. Thornton
IEEEARES
2007
IEEE
14 years 2 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
ISMAR
2007
IEEE
14 years 2 months ago
Semi-automatic Annotations in Unknown Environments
Unknown environments pose a particular challenge for augmented reality applications because the 3D models required for tracking, rendering and interaction are not available ahead ...
Gerhard Reitmayr, Ethan Eade, Tom Drummond