Sciweavers

294 search results - page 32 / 59
» Analyzing Consistency of Security Policies
Sort
View
ESTIMEDIA
2003
Springer
14 years 18 days ago
Energy-Aware Wireless Video Streaming
This paper presents a dynamic energy management policy for a wireless video streaming system, consisting of battery-powered client and server. The paper starts from the observatio...
Ali Iranli, Kihwan Choi, Massoud Pedram
CCS
2007
ACM
14 years 1 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
ACSAC
2002
IEEE
14 years 10 days ago
Digging For Worms, Fishing For Answers
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle,...
Florian P. Buchholz, Thomas E. Daniels, James P. E...
IEEEARES
2009
IEEE
14 years 2 months ago
Deconvolving Protected Signals
Abstract—The variable clock (VC) side-channel countermeasure consists in clocking a chip with an internal oscillator whose parameters (frequency, duty cycle, shape etc.) vary ran...
Mohaned Kafi, Sylvain Guilley, S. Marcello, David ...
MOC
2010
13 years 2 months ago
Analysis of spectral approximations using prolate spheroidal wave functions
Abstract. In this paper, the approximation properties of the prolate spheroidal wave functions of order zero (PSWFs) are studied, and a set of optimal error estimates are derived f...
Li-lian Wang