Sciweavers

107 search results - page 10 / 22
» A Reputation-Based Approach for Securing Vivaldi Embedding S...
Sort
View
RTSS
1999
IEEE
13 years 11 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
HASE
1998
IEEE
13 years 11 months ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
WORDS
2003
IEEE
14 years 23 days ago
Security and Middleware
The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the ...
Anders Andersen, Gordon S. Blair, Per Harald Myrva...
ATC
2008
Springer
13 years 9 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich