Sciweavers

15379 search results - page 334 / 3076
» Protecting users from
Sort
View
139
Voted
SOSP
2003
ACM
16 years 18 days ago
Separating agreement from execution for byzantine fault tolerant services
We describe a new architecture for Byzantine fault tolerant state machine replication that separates agreement that orders requests from execution that processes requests. This se...
Jian Yin, Jean-Philippe Martin, Arun Venkataramani...
127
Voted
CCS
2005
ACM
15 years 9 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
147
Voted
DRM
2005
Springer
15 years 9 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
141
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
99
Voted
ICPR
2002
IEEE
16 years 4 months ago
Object Recognition Supported by User Interaction for Service Robots
This paper describes an interactive vision system for a robot that finds an object specified by a user and brings it to the user. The system first registers object models automati...
Yasushi Makihara, Masao Takizawa, Yoshiaki Shirai,...