Semantic Scholar uses AI to extract papers important to this topic.
The OAuth 2.0 authorization framework enables a third-party
application to obtain limited access to an HTTP service, either on… Expand Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing… Expand White LED offers advantageous properties such as high brightness, reliability, lower power consumption and long lifetime. White… Expand In "grids" and "collaboratories", we find distributed communities of resource providers and resource consumers, within which… Expand Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of… Expand Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures… Expand In this paper, we develop a new paradigm for access control and authorization management, called task-based authorization… Expand Program slicing is a decomposition technique that slides program components not relevant to a chosen computation, referred to as… Expand This ebook is the first authorized digital version of Kernighan and Ritchie's 1988 classic, The C Programming Language (2nd Ed… Expand This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It… Expand