Sciweavers

1317 search results - page 71 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
112
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
274
Voted
DOCENG
2011
ACM
14 years 4 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
153
Voted
TPDS
2008
133views more  TPDS 2008»
15 years 4 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
DAC
1998
ACM
16 years 5 months ago
A Case Study in Embedded System Design: An Engine Control Unit
A number of techniques and software tools for embedded system design have been recently proposed. However, the current practice in the designer community is heavily based on manua...
Alberto L. Sangiovanni-Vincentelli, Antonino Damia...
ACMSE
2005
ACM
15 years 10 months ago
Image is everything: advancing HCI knowledge and interface design using the system image
As the field of human-computer interaction matures, the need for proven, dependable engineering processes for interface development becomes apparent. Our continuing work in develo...
Jason Chong Lee, Christa M. Chewar, D. Scott McCri...