Sciweavers

454 search results - page 43 / 91
» Making distributed systems secure with program analysis and ...
Sort
View
WORDS
2003
IEEE
14 years 2 months ago
Foucault's Pendulum in the Distributed Control Lab
The ’Distributed Control Lab’ [6] at Hasso-PlattnerInstitute, University of Potsdam allows experimentation with a variety of physical equipment via the web (intra and internet...
Andreas Rasche, Peter Tröger, Michael Dirska,...
WPES
2003
ACM
14 years 2 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
BIOSURVEILLANCE
2007
Springer
14 years 2 months ago
Global Foot-and-Mouth Disease Surveillance Using BioPortal
Abstract. The paper presents a description of the FMD BioPortal biosurveillance system (http://fmd.ucdavis.edu/bioportal/) that is currently operating to capture, analyze, and diss...
Mark Thurmond, Andrés Perez, Chunju Tseng, ...
CCS
2009
ACM
14 years 1 days ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
DANCE
2002
IEEE
14 years 1 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...