Sciweavers

318 search results - page 19 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
DATE
1999
IEEE
64views Hardware» more  DATE 1999»
13 years 12 months ago
Dynamic Power Management for non-stationary service requests
Dynamic Power Management is a design methodology aiming at reducing power consumption of electronic systems, by performing selective shutdown of the idle system resources. The eff...
Eui-Young Chung, Luca Benini, Alessandro Bogliolo,...
ACSAC
2010
IEEE
13 years 5 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
IANDO
2010
112views more  IANDO 2010»
13 years 2 months ago
Generative mechanisms for innovation in information infrastructures
This paper investigates how innovation of ICT based services takes place within existing infrastructures, including the whole network of technology, vendors and customers. Our res...
Bendik Bygstad
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...