Sciweavers

2024 search results - page 362 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
WCNC
2008
IEEE
14 years 3 months ago
Exploiting Historical Spectrum Occupancy Information for Adaptive Spectrum Sensing
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...
IJAHUC
2011
143views more  IJAHUC 2011»
13 years 3 days ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
WWW
2008
ACM
14 years 9 months ago
A domain-specific language for the model-driven construction of advanced web-based dialogs
Complex dialogs with comprehensive underlying data models are gaining increasing importance in today's Web applications. This in turn accelerates the need for highly dynamic ...
Patrick Freudenstein, Martin Nussbaumer, Florian A...
WWW
2004
ACM
14 years 9 months ago
Cooperative middleware specialization for service oriented architectures
Service-oriented architectures (SOA) will provide the basis of the next generation of distributed software systems, and have already gained enormous traction in the industry throu...
Nirmal Mukhi, Ravi B. Konuru, Francisco Curbera