Sciweavers

326 search results - page 48 / 66
» Capabilities for Uniqueness and Borrowing
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CCS
2009
ACM
14 years 2 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICC
2007
IEEE
198views Communications» more  ICC 2007»
14 years 2 months ago
On Control Plane for Service Provisioning in Light-trail WDM Optical Ring Networks
: A light-trail is a generalized lightpath that enables multiple nodes to statistically share an optical communication path (wavelength bus). A light-trail is different from a ligh...
Ashwin Gumaste, Janak Chandarana, Paresh Bafna, Na...
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
13 years 12 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang