Sciweavers

5758 search results - page 1030 / 1152
» Anonymity-preserving data collection
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CODES
2008
IEEE
14 years 4 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
14 years 4 months ago
Video Processing Requirements on SoC Infrastructures
Applications from the embedded consumer domain put challenging requirements on SoC infrastructures, i.e. interconnect and memory. Specifically, video applications demand large sto...
Pieter van der Wolf, Tomas Henriksson
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
14 years 4 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...
HICSS
2008
IEEE
126views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Empirical Investigation of Knowledge Creation in Electronic Networks of Practice: Social Capital and Theory of Planned Behavi
How to achieve knowledge creation effectively remains a problem, this becomes even more difficult in a loosely knitted community such as networks of practice. This is because know...
Shih-Wei Chou, Yu-Chieh Chang
« Prev « First page 1030 / 1152 Last » Next »