Sciweavers

4307 search results - page 600 / 862
» Dynamic Spyware Analysis
Sort
View
IWIA
2005
IEEE
14 years 4 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
AI
2005
Springer
14 years 4 months ago
Generating Adaptive Multimedia Presentations Based on a Semiotic Framework
Abstract. We propose a framework for generating adaptive multimedia presentations through the dynamic selection of files from a large data repository. The presentation is generate...
Osama El Demerdash, Sabine Bergler, Leila Kosseim,...
ATAL
2005
Springer
14 years 4 months ago
Simulating data dissemination techniques for local reputation systems
In distributed scenarios the robustness of a reputation mechanism depends on the data available for computation. Especially in ad-hoc networks the amount of available data is rest...
Andreas Schlosser, Marco Voss
CHES
2005
Springer
129views Cryptology» more  CHES 2005»
14 years 4 months ago
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment
Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results sh...
Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng L...
FIMH
2005
Springer
14 years 4 months ago
Suppression of IVUS Image Rotation. A Kinematic Approach
IntraVascular Ultrasound (IVUS) is an exploratory technique used in interventional procedures that shows cross section images of arteries and provides qualitative information about...
Misael Rosales, Petia Radeva, Oriol Rodriguez, Deb...