Sciweavers

19003 search results - page 3782 / 3801
» We Need Assurance!
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
ACSAC
2010
IEEE
13 years 5 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
DLOG
2010
13 years 5 months ago
TBox Classification in Parallel: Design and First Evaluation
Abstract. One of the most frequently used inference services of description logic reasoners classifies all named classes of OWL ontologies into a subsumption hierarchy. Due to emer...
Mina Aslani, Volker Haarslev
FPL
2010
Springer
124views Hardware» more  FPL 2010»
13 years 5 months ago
Finding System-Level Information and Analyzing Its Correlation to FPGA Placement
One of the more popular placement algorithms for Field Programmable Gate Arrays (FPGAs) is called Simulated Annealing (SA). This algorithm tries to create a good quality placement ...
Farnaz Gharibian, Lesley Shannon, Peter Jamieson
GLOBECOM
2010
IEEE
13 years 5 months ago
Energy Saving Performance Comparison of Coordinated Multi-Point Transmission and Wireless Relaying
Currently, two cooperative transmission strategies, Coordinated Multi-Point (CoMP) Transmission and wireless relaying, are expected to be deployed in future cellular systems to imp...
Dongxu Cao, Sheng Zhou, Chao Zhang, Zhisheng Niu
« Prev « First page 3782 / 3801 Last » Next »