Sciweavers

1081 search results - page 163 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
ISDA
2010
IEEE
13 years 6 months ago
Comparing SVM ensembles for imbalanced datasets
Real life datasets often suffer from the problem of class imbalance, which thwarts supervised learning process. In such data sets examples of positive (minority) class are signific...
Vasudha Bhatnagar, Manju Bhardwaj, Ashish Mahabal
MAM
2006
95views more  MAM 2006»
13 years 8 months ago
A selective DVS technique based on battery residual
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Sukwon Choi, Hojung Cha, Rhan Ha
ESSOS
2011
Springer
13 years 7 days ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
LISA
2003
13 years 10 months ago
Virtual Appliances for Deploying and Maintaining Software
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...
ASPLOS
2009
ACM
14 years 9 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...