Sciweavers

557 search results - page 29 / 112
» Two experiences designing for effective security
Sort
View
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CCS
2008
ACM
13 years 10 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
SOUPS
2009
ACM
14 years 3 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
ICMCS
2005
IEEE
115views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Detector Design for Parametric Speech Watermarking
Parametric watermarking is effected by modifying the linear predictor coefficients of speech. In this work, the parameter noise is analyzed when watermarked speech is subjected t...
Aparna Gurijala, John R. Deller Jr.
ICRA
2010
IEEE
112views Robotics» more  ICRA 2010»
13 years 7 months ago
Psychophysical evaluation of control scheme designed for optimal kinesthetic perception in scaled teleoperation
— This paper focuses on psychophysical evaluation of the control scheme developed to optimize the kinesthetic perception during the scaled teleoperation. The control problem is f...
Hyoung Il Son, T. Bhattacharjee, Hoeryong Jung, Do...