Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Laboratoire d'Étude des Systèmes Informatiques et Automatiques
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

First Step in Cross-Layers Measurement in Wireless Networks How to Adapt to Resource Constraints for Optimizing End-to-End Services?

Philippe Owezarski , Rasha Ghassan Hasan , Guillaume Kremer , Pascal Berthou
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.150-161, ⟨10.1007/978-3-642-21560-5_13⟩
Conference papers hal-01583648v1