Sciweavers

71 search results - page 4 / 15
» Hiding HSM Systems from the User
Sort
View
24
Voted
PE
2010
Springer
124views Optimization» more  PE 2010»
13 years 2 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ACMDIS
2006
ACM
14 years 1 months ago
The spatial character of sensor technology
By considering the spatial character of sensor-based interactive systems, this paper investigates how discussions of seams and seamlessness in ubiquitous computing neglect the com...
Stuart Reeves, Tony P. Pridmore, Andy Crabtree, Jo...
COMPSAC
2002
IEEE
14 years 11 days ago
Understanding SQL through Iconic Interfaces
Visual Query Languages represent an evolution, in terms of understandability and adaptability, with respect to traditional textual languages. We present an iconic query system tha...
Lerina Aversano, Gerardo Canfora, Andrea De Lucia,...
ERSHOV
2006
Springer
13 years 11 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer