Sciweavers

2945 search results - page 70 / 589
» Designing and Implementing Malicious Hardware
Sort
View
MOBISYS
2004
ACM
16 years 3 months ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
IPPS
2003
IEEE
15 years 9 months ago
System-Level Modeling of Dynamically Reconfigurable Hardware with SystemC
To cope with the increasing demand for higher computational power and flexibility, dynamically reconfigurable blocks become an important part inside a system-on-chip. Several meth...
Antti Pelkonen, Kostas Masselos, Miroslav Cup&aacu...
OSDI
2004
ACM
16 years 4 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
WWW
2010
ACM
15 years 11 months ago
SpotRank: a robust voting system for social news websites
In a social news website people share content they found on the web, called news, then vote for those they like the most. Voting for a news is then considered as a recommendation,...
Thomas Largillier, Guillaume Peyronnet, Sylvain Pe...
IPPS
2006
IEEE
15 years 10 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah