Sciweavers

83 search results - page 8 / 17
» Software Deployment, Past, Present and Future
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 7 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
EUROSYS
2006
ACM
14 years 4 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
MUE
2007
IEEE
119views Multimedia» more  MUE 2007»
14 years 1 months ago
Building Scalable and Robust Architecture for Ubiquitous Sensor Networks with the help of Design Patterns
Design patterns address a recurring design problem for a specific situation, and present a solution. Design patterns have proven useful in many engineering disciplines such as Sof...
Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong ...
PDP
2003
IEEE
14 years 25 days ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...