Sciweavers

12697 search results - page 2194 / 2540
» Call for Papers
Sort
View
CCS
2007
ACM
15 years 10 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
ISQED
2006
IEEE
147views Hardware» more  ISQED 2006»
15 years 10 months ago
Compact Reduced Order Modeling for Multiple-Port Interconnects
— In this paper, we propose an efficient model order reduction (MOR) algorithm, called MTermMOR, for modeling interconnect circuits with large number of external ports. The prop...
Pu Liu, Sheldon X.-D. Tan, Bruce McGaughy, Lifeng ...
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 10 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
MOBICOM
2006
ACM
15 years 10 months ago
On accurate measurement of link quality in multi-hop wireless mesh networks
This paper presents a highly efficient and accurate link-quality measurement framework, called EAR (Efficient and Accurate link-quality monitoR), for multi-hop wireless mesh net...
Kyu-Han Kim, Kang G. Shin
INFOCOM
2005
IEEE
15 years 10 months ago
MiNT: a miniaturized network testbed for mobile wireless research
— Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being st...
Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-...
« Prev « First page 2194 / 2540 Last » Next »