Sciweavers

52 search results - page 3 / 11
» On the effectiveness of the metamorphic shield
Sort
View
JCC
2008
67views more  JCC 2008»
13 years 7 months ago
Systematic investigation on the geometric dependence of the calculated nuclear magnetic shielding constants
: We perform a systematic examination on the dependence of the calculated nuclear magnetic shielding constants on the chosen geometry for a selective set of density functional meth...
Ying Zhang, Xin Xu, Yijing Yan
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ICRA
2003
IEEE
103views Robotics» more  ICRA 2003»
14 years 27 days ago
Highly compliant and self-tightening docking modules for precise and fast connection of self-reconfigurable robots
― This paper describes a new docking system called Compliant-And-Self-Tightening (CAST) developed as an effective and efficient connector for joining and releasing modules of sel...
Behrokh Khoshnevis, Peter M. Will, Wei-Min Shen
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi