Sciweavers

113 search results - page 17 / 23
» Computing the Leakage of Information-Hiding Systems
Sort
View
WISEC
2010
ACM
14 years 3 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
SACMAT
2011
ACM
12 years 11 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
EENERGY
2010
14 years 14 days ago
Combustible gases and early fire detection: an autonomous system for wireless sensor networks
Fires or toxic gas leakages may have grave consequences like significant pecuniary loss or even lead to human victims. In this paper we present an autonomous wireless sensor syste...
Andrey Somov, D. Spirjakin, M. Ivanov, I. Khromush...
PATMOS
2007
Springer
14 years 2 months ago
Optimization for Real-Time Systems with Non-convex Power Versus Speed Models
Abstract. Until now, the great majority of research in low-power systems has assumed a convex power model. However, recently, due to the confluence of emerging technological and ar...
Ani Nahapetian, Foad Dabiri, Miodrag Potkonjak, Ma...
COLCOM
2007
IEEE
14 years 15 days ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino