Sciweavers

3605 search results - page 539 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
185
Voted
DIM
2006
ACM
15 years 10 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
15 years 5 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ESORICS
2011
Springer
14 years 4 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
LCN
2006
IEEE
15 years 10 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
102
Voted
ICCV
2007
IEEE
16 years 6 months ago
Soylent Grid: it's Made of People
The ground truth labeling of an image dataset is a task that often requires a large amount of human time and labor. We present an infrastructure for distributed human labeling tha...
Stephan Steinbach, Vincent Rabaud, Serge Belongie