Sciweavers

1744 search results - page 125 / 349
» The Steganographic File System
Sort
View
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 4 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
DATE
2007
IEEE
99views Hardware» more  DATE 2007»
14 years 4 months ago
Very wide register: an asymmetric register file organization for low power embedded processors
In current embedded systems processors, multi-ported register files are one of the most power hungry parts of the processor, even when they are clustered. This paper presents a n...
Praveen Raghavan, Andy Lambrechts, Murali Jayapala...
ICAC
2005
IEEE
14 years 3 months ago
PICCIL: Interactive Learning to Support Log File Categorization
Motivated by the real-world application of categorizing system log messages into defined situation categories, this paper describes an interactive text categorization method, PICC...
David Loewenstern, Sheng Ma, Abdi Salahshour
AIED
2005
Springer
14 years 3 months ago
Inferring learning and attitudes from a Bayesian Network of log file data
A student's goals and attitudes while interacting with a tutor are typically unseen and unknowable. However their outward behavior (e.g. problem-solving time, mistakes and hel...
Ivon Arroyo, Beverly Park Woolf
P2P
2002
IEEE
112views Communications» more  P2P 2002»
14 years 2 months ago
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications
In this paper, we present the concept of Passive Distributed Indexing, a general-purpose distributed search service for mobile file sharing applications, which is based on peer-to...
Christoph Lindemann, Oliver P. Waldhorst