Sciweavers

1462 search results - page 268 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
MOBISYS
2007
ACM
14 years 7 months ago
COMBINE: leveraging the power of wireless peers through collaborative downloading
Mobile devices are increasingly equipped with multiple network interfaces: Wireless Local Area Network (WLAN) interfaces for local connectivity and Wireless Wide Area Network (WWA...
Ganesh Ananthanarayanan, Venkata N. Padmanabhan, L...
WWW
2005
ACM
14 years 8 months ago
MiSpider: a continuous agent on web pages
In this paper, we propose a Web based agent system called MiSpider, which provides intelligent web services on web browsers. MiSpider enables users to use agents on existing brows...
Yujiro Fukagaya, Tadachika Ozono, Takayuki Ito, To...
JAPLL
2006
112views more  JAPLL 2006»
13 years 7 months ago
Intuitionistic hybrid logic
Hybrid logics are a principled generalization of both modal logics and description logics, a standard formalism for knowledge representation. In this paper we give the first const...
Torben Braüner, Valeria de Paiva
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 9 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 7 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin