Sciweavers

1744 search results - page 270 / 349
» The Steganographic File System
Sort
View
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 9 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
DSN
2003
IEEE
15 years 9 months ago
Characterization of Linux Kernel Behavior under Errors
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
SIGIR
2003
ACM
15 years 9 months ago
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web
This paper describes a decentralized peer-to-peer model for building a Web crawler. Most of the current systems use a centralized client-server model, in which the crawl is done by...
Aameek Singh, Mudhakar Srivatsa, Ling Liu, Todd Mi...
MSS
2000
IEEE
84views Hardware» more  MSS 2000»
15 years 8 months ago
An Overview of Version 0.9.5 Proposed SCSI Device Locks
Symmetric shared disks file systems are functional, versatile, and just plain cool. For these file systems to work, they require a global lock space, acessable to all clients. T...
Andrew P. Barry, Mike Tilstra, Matthew T. O'Keefe,...
SIGIR
1999
ACM
15 years 8 months ago
Content-Based Retrieval for Music Collections
A content-based retrieval model for tackling the mismatch problems specific to music data is proposed and implemented. The system uses a pitch profile encoding for queries in any ...
Yuen-Hsien Tseng