Sciweavers

5084 search results - page 862 / 1017
» Proving Possibility Properties
Sort
View
SACMAT
2009
ACM
15 years 11 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
CW
2008
IEEE
15 years 11 months ago
Taxonomy and Implementation of Redirection Techniques for Ubiquitous Passive Haptic Feedback
Traveling through immersive virtual environments (IVEs) by means of real walking is an important activity to increase naturalness of VR-based interaction. However, the size of the...
Frank Steinicke, Gerd Bruder, Luv Kohli, Jason Jer...
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
15 years 11 months ago
A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking
— As the feature size of transistors gets smaller, fabricating them becomes challenging. Manufacturing process follows various corrective design-for-manufacturing (DFM) steps to ...
Swaroop Ghosh, Patrick Ndai, Kaushik Roy
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
15 years 11 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo
149
Voted
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...