Sciweavers

575 search results - page 46 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
13 years 11 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
A study on user acceptance of error visualization techniques
Location-based services in general require information about the position of certain objects. For instance, for a navigation service the position of the user needs to be known. Th...
Hendrik Lemelson, Thomas King, Wolfgang Effelsberg
VRML
2004
ACM
14 years 1 months ago
Automatic derivation of electronic maps from X3D/VRML worlds
Maps of physical environments and geographical areas are pervasively exploited in many human activities. Electronic maps of virtual worlds have been studied and proven to be usefu...
Lucio Ieronutti, Roberto Ranon, Luca Chittaro
CCS
2009
ACM
13 years 11 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
14 years 8 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima