Sciweavers

82 search results - page 9 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
INTENSIVE
2009
IEEE
14 years 4 months ago
A Service for Data-Intensive Computations on Virtual Clusters
Digital Preservation deals with the long-term storage, access, and maintenance of digital data objects. In order to prevent a loss of information, digital libraries and archives a...
Rainer Schmidt, Christian Sadilek, Ross King
SCAM
2007
IEEE
14 years 4 months ago
Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation
Java bytecode instrumentation is a widely used technique, especially for profiling purposes. In order to ensure the instrumentation of all classes in the system, including dynami...
Walter Binder, Jarle Hulaas, Philippe Moret
AUIC
2003
IEEE
14 years 3 months ago
Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface
This paper reports work done as part of the Large Interactive Display Surface(LIDS) project at the University of Waikato. One application of the LIDS equipment is distributed meet...
Mark D. Apperley, Laurie McLeod, Masood Masoodian
SRDS
2003
IEEE
14 years 3 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
CCS
2007
ACM
14 years 1 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...