Sciweavers

3420 search results - page 542 / 684
» A Language-Based Approach to Security
Sort
View
SIGCOMM
2012
ACM
12 years 19 days ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
CVPR
2012
IEEE
12 years 19 days ago
Max-margin early event detectors
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While tempor...
Minh Hoai Nguyen, Fernando De la Torre
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 3 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
POPL
2009
ACM
14 years 10 months ago
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Benjamin Grégoire, Gilles Barthe, Santiago ...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye