Sciweavers

1744 search results - page 125 / 349
» The Steganographic File System
Sort
View
134
Voted
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 10 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
114
Voted
DATE
2007
IEEE
99views Hardware» more  DATE 2007»
15 years 10 months ago
Very wide register: an asymmetric register file organization for low power embedded processors
In current embedded systems processors, multi-ported register files are one of the most power hungry parts of the processor, even when they are clustered. This paper presents a n...
Praveen Raghavan, Andy Lambrechts, Murali Jayapala...
136
Voted
ICAC
2005
IEEE
15 years 9 months ago
PICCIL: Interactive Learning to Support Log File Categorization
Motivated by the real-world application of categorizing system log messages into defined situation categories, this paper describes an interactive text categorization method, PICC...
David Loewenstern, Sheng Ma, Abdi Salahshour
127
Voted
AIED
2005
Springer
15 years 9 months ago
Inferring learning and attitudes from a Bayesian Network of log file data
A student's goals and attitudes while interacting with a tutor are typically unseen and unknowable. However their outward behavior (e.g. problem-solving time, mistakes and hel...
Ivon Arroyo, Beverly Park Woolf
115
Voted
P2P
2002
IEEE
112views Communications» more  P2P 2002»
15 years 8 months ago
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications
In this paper, we present the concept of Passive Distributed Indexing, a general-purpose distributed search service for mobile file sharing applications, which is based on peer-to...
Christoph Lindemann, Oliver P. Waldhorst