Sciweavers

19003 search results - page 77 / 3801
» We Need Assurance!
Sort
View
TRUST
2010
Springer
14 years 28 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
CN
2008
100views more  CN 2008»
13 years 8 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CSMR
2000
IEEE
14 years 8 days ago
A Proposal for Supporting Software Evolution in Componentware
In practice, a pure top-down and refinement-based development process is not applicable. A more iterative and incremental approach is usually applied with respect to changing req...
Andreas Rausch
ICCBR
1999
Springer
14 years 4 days ago
When Experience Is Wrong: Examining CBR for Changing Tasks and Environments
Case-based problem-solving systems reason and learn from experiences, building up case libraries of problems and solutions to guide future reasoning. The expected bene ts of this l...
David B. Leake, David C. Wilson
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...