Sciweavers

15379 search results - page 107 / 3076
» Protecting users from
Sort
View
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ACSAC
2000
IEEE
14 years 7 days ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 7 months ago
Resource Allocation for Downlink Cellular OFDMA Systems: Part I - Optimal Allocation
In this pair of papers (Part I and Part II in this issue), we investigate the issue of power control and subcarrier assignment in a sectorized two-cell downlink OFDMA system impair...
Nassar Ksairi, Pascal Bianchi, Philippe Ciblat, Wa...
ENVSOFT
2006
76views more  ENVSOFT 2006»
13 years 7 months ago
LQGraph: A software package for optimizing connectivity in conservation planning
LQGraph implements methods for optimizing the connectivity of sites administered to protect biodiversity (a conservation area network). The methods are suitable for existing prote...
Trevon Fuller, Sahotra Sarkar
IEEEMM
2007
96views more  IEEEMM 2007»
13 years 7 months ago
Perceptual Issues in Haptic Digital Watermarking
— The growing interest in haptic applications such as skill training, museum displays, multimodal interfaces, aids for people with visual and/or hearing impairments, etc suggests...
Domenico Prattichizzo, Mauro Barni, Gloria Menegaz...