Sciweavers

1898 search results - page 195 / 380
» Weak Keys for IDEA
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
INFOCOM
2008
IEEE
14 years 4 months ago
A Singlehop Collaborative Feedback Primitive for Wireless Sensor Networks
Abstract—To achieve scalability, energy-efficiency, and timeliness, wireless sensor network deployments increasingly employ in-network processing. In this paper, we identify sin...
Murat Demirbas, Onur Soysal, Muzammil Hussain
TABLETOP
2008
IEEE
14 years 4 months ago
Adaptive interface for text input on large-scale interactive surfaces
In this paper we present a novel approach to text input on large interactive surfaces using a combination of strategies to resolve the inherent difficulties with text input on su...
Johannes Hirche, Peter Bomark, Mikael Bauer, Pawel...
ACSC
2007
IEEE
14 years 4 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
WISE
2007
Springer
14 years 4 months ago
Learning Implicit User Interests Using Ontology and Search History for Personalization
Abstract. The key for providing a robust context for personalized information retrieval is to build a library which gathers the long term and the short term user’s interests and ...
Mariam Daoud, Lynda Tamine, Mohand Boughanem, Bila...