Sciweavers

3095 search results - page 564 / 619
» Ubiquitous presence systems
Sort
View
CCS
2003
ACM
14 years 1 months ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
ASYNC
2002
IEEE
124views Hardware» more  ASYNC 2002»
14 years 1 months ago
Synchronous Interlocked Pipelines
In a circuit environment that is becoming increasingly sensitive to dynamic power dissipation and noise, and where cycle time available for control decisions continues to decrease...
Hans M. Jacobson, Prabhakar Kudva, Pradip Bose, Pe...
HPDC
2002
IEEE
14 years 1 months ago
A Scalable QoS-Aware Service Aggregation Model for Peer-to-Peer Computing Grids
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
Xiaohui Gu, Klara Nahrstedt
DCOSS
2010
Springer
14 years 1 months ago
MetroTrack: Predictive Tracking of Mobile Events Using Mobile Phones
We propose to use mobile phones carried by people in their everyday lives as mobile sensors to track mobile events. We argue that sensor-enabled mobile phones are best suited to de...
Gahng-Seop Ahn, Mirco Musolesi, Hong Lu, Reza Olfa...
CDC
2009
IEEE
185views Control Systems» more  CDC 2009»
14 years 1 months ago
Discrete Empirical Interpolation for nonlinear model reduction
A dimension reduction method called Discrete Empirical Interpolation (DEIM) is proposed and shown to dramatically reduce the computational complexity of the popular Proper Orthogo...
Saifon Chaturantabut, Danny C. Sorensen