Sciweavers

82 search results - page 5 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
DIMVA
2008
13 years 11 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
IROS
2008
IEEE
170views Robotics» more  IROS 2008»
14 years 4 months ago
Humanoid robot HRP-3
— In this paper, the development of humanoid robot HRP-3 is presented. HRP-3, which stands for Humanoid Robotics Platform–3, is a human-size humanoid robot developed as the suc...
Kenji Kaneko, Kensuke Harada, Fumio Kanehiro, Gou ...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
SAC
2008
ACM
13 years 9 months ago
A lifecycle approach to SOA governance
Due to the distributed nature of Service-Oriented Architectures (SOA), maintaining control in a SOA environment becomes more difficult as services spread over different lines-of-b...
T. G. J. Schepers, Maria-Eugenia Iacob, Pascal van...
COMPSAC
2008
IEEE
13 years 11 months ago
Avoiding Program Failures Through Safe Execution Perturbations
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations a...
Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Z...