Sciweavers

82 search results - page 12 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
ACSW
2003
13 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
IM
2003
13 years 11 months ago
Using Neural Networks to Identify Control and Management Plane Poison Messages
: Poison message failure propagation is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks: Some or all of the network elemen...
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
ECRTS
2010
IEEE
13 years 11 months ago
Partitioning Parallel Applications on Multiprocessor Reservations
A full exploitation of the computational power available in a multi-core platform requires the software to be specified in terms of parallel execution flows. At the same time, mode...
Giorgio C. Buttazzo, Enrico Bini, Yifan Wu
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 10 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
ATAL
2006
Springer
13 years 11 months ago
On proactivity and maintenance goals
Goals are an important concept in intelligent agent systems, and can take a variety of forms. One such form is maintenance goals, which, unlike achievement goals, define states th...
Simon Duff, James Harland, John Thangarajah