Sciweavers

6071 search results - page 1206 / 1215
» A management information repository for distributed applicat...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
CASES
2005
ACM
13 years 10 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
DAC
2006
ACM
13 years 10 months ago
A fast HW/SW FPGA-based thermal emulation framework for multi-processor system-on-chip
With the growing complexity in consumer embedded products and the improvements in process technology, Multi-Processor SystemOn-Chip (MPSoC) architectures have become widespread. T...
David Atienza, Pablo Garcia Del Valle, Giacomo Pac...
LREC
2010
246views Education» more  LREC 2010»
13 years 10 months ago
Q-WordNet: Extracting Polarity from WordNet Senses
This paper presents Q-WordNet, a lexical resource consisting of WordNet senses automatically annotated by positive and negative polarity. Polarity classification amounts to decide...
Rodrigo Agerri, Ana García-Serrano
NSDI
2010
13 years 10 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
« Prev « First page 1206 / 1215 Last » Next »