Sciweavers

804 search results - page 71 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CCS
2010
ACM
15 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IWNAS
2008
IEEE
15 years 11 months ago
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
With the increased popularity of replica-based services in distributed systems such as the Grid, consistency control among replicas becomes more and more important. To this end, I...
Yijun Lu, Xueming Li, Hong Jiang
131
Voted
IJCAI
1989
15 years 5 months ago
Decision-Making in an Embedded Reasoning System
The developmentof reasoning systems that can reason and plan in a continuously changing environment is emerging as an important area of research in Arti cial Intelligence. Thispap...
Michael P. Georgeff, François Felix Ingrand
SACMAT
2009
ACM
15 years 11 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
INFOCOM
2012
IEEE
13 years 7 months ago
Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum
—Recent advances in cognitive radio (CR) technology have brought about a number of wireless standards that support opportunistic access to available white-space spectrum. Address...
Bo Gao, Jung-Min Park 0001, Yaling Yang