Sciweavers

17054 search results - page 3314 / 3411
» Logics of Dynamical Systems
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 8 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
WEBI
2010
Springer
13 years 8 months ago
Incorporating Seasonality into Search Suggestions Derived from Intranet Query Logs
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...
CCGRID
2009
IEEE
13 years 7 months ago
A Live Storage Migration Mechanism over WAN for Relocatable Virtual Machine Services on Clouds
IaaS (Infrastructure-as-a-Service) is an emerging concept of cloud computing, which allows users to obtain hardware resources from virtualized datacenters. Although many commercial...
Takahiro Hirofuchi, Hirotaka Ogawa, Hidemoto Nakad...
IJSSE
2010
80views more  IJSSE 2010»
13 years 7 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
ALGOSENSORS
2010
Springer
13 years 9 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
« Prev « First page 3314 / 3411 Last » Next »