Sciweavers

2178 search results - page 417 / 436
» Toward Systemically Secure IT Architectures
Sort
View
DAC
2002
ACM
14 years 8 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
SIGCOMM
2009
ACM
14 years 2 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
ESWS
2007
Springer
14 years 1 months ago
Empowering Software Maintainers with Semantic Web Technologies
Abstract. Software maintainers routinely have to deal with a multitude of artifacts, like source code or documents, which often end up disconnected, due to their different represen...
René Witte, Yonggang Zhang, Juergen Rilling
EUROPAR
2007
Springer
14 years 1 months ago
Getting 10 Gb/s from Xen: Safe and Fast Device Access from Unprivileged Domains
The networking performance available to Virtual Machines (VMs) can be low due to the inefficiencies of transferring network packets between the host domain and guests. This can lim...
Kieran Mansley, Greg Law, David Riddoch, Guido Bar...