Sciweavers

232 search results - page 45 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
MOBISYS
2010
ACM
13 years 11 months ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
CCS
2008
ACM
13 years 10 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
DIMVA
2010
13 years 10 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
FLAIRS
1998
13 years 10 months ago
Investigating the Validity of a Test Case Selection Methodology for Expert System Validation
Providing assurances of performance is an important aspect of successful development and commercialization of expert systems. However, this can only be done if the quality of the ...
Jan-Eike Michels, Thomas Abel, Rainer Knauf, Aveli...
ACL
1997
13 years 10 months ago
Paradigmatic Cascades: a Linguistically Sound Model of Pronunciation by Analogy
We present and experimentally evaluate a new model of pronunciation by analogy: the paradigmatic cascades model. Given a pronunciation lexicon, this algorithm first extracts the m...
François Yvon