Sciweavers

318 search results - page 42 / 64
» How to Leak a Secret
Sort
View
CCS
2008
ACM
13 years 9 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
EWCBR
2008
Springer
13 years 9 months ago
Knowledge Planning and Learned Personalization for Web-Based Case Adaptation
How to endow case-based reasoning systems with effective case adaptation capabilities is a classic problem. A significant impediment to developing automated adaptation procedures i...
David B. Leake, Jay H. Powell
CMS
2010
138views Communications» more  CMS 2010»
13 years 9 months ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl
PLANX
2008
13 years 9 months ago
XML Stream Processing Using a Lazy Concurrent Language
Motivated by previous work on XML stream processing, we noticed that programmers need concurrency to save space, especially in a lazy language. User-controllable concurrency provi...
Shin-Cheng Mu, Ta-Chung Tsai, Keisuke Nakano
FLAIRS
2001
13 years 9 months ago
Combining Concept Mapping with CBR: Towards Experience-Based Support for Knowledge Modeling
Knowledge management depends on effective methods for capturing knowledge in useful forms and making it available when needed. Electronic concept maps provide a promising represen...
Alberto J. Cañas, David B. Leake, Ana Gabri...