Sciweavers

779 search results - page 86 / 156
» Towards an Integrated Model for Data, Metadata, and Operatio...
Sort
View
ICICS
2009
Springer
14 years 3 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
ICISS
2010
Springer
13 years 7 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IC
2001
13 years 10 months ago
Design and Implementation of XML-Based Digital Video Library System
In this paper, we describe the design and implementation of an XML-Based Digital Video Library (XDVL) System. The system includes automatic processes from video creation through v...
Jacky C. K. Ma, Michael R. Lyu
IPM
2010
157views more  IPM 2010»
13 years 7 months ago
Personalization of tagging systems
Social media systems have encouraged end user participation in the Internet, for the purpose of storing and distributing Internet content, sharing opinions and maintaining relatio...
Jun Wang, Maarten Clements, Jie Yang, Arjen P. de ...
DAC
2008
ACM
14 years 10 months ago
Daedalus: toward composable multimedia MP-SoC design
Daedalus is a system-level design flow for the design of multiprocessor system-on-chip (MP-SoC) based embedded multimedia systems. It offers a fully integrated tool-flow in which ...
Hristo Nikolov, Mark Thompson, Todor Stefanov, And...