Sciweavers

1898 search results - page 195 / 380
» Weak Keys for IDEA
Sort
View
111
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
INFOCOM
2008
IEEE
15 years 10 months ago
A Singlehop Collaborative Feedback Primitive for Wireless Sensor Networks
Abstract—To achieve scalability, energy-efficiency, and timeliness, wireless sensor network deployments increasingly employ in-network processing. In this paper, we identify sin...
Murat Demirbas, Onur Soysal, Muzammil Hussain
TABLETOP
2008
IEEE
15 years 10 months ago
Adaptive interface for text input on large-scale interactive surfaces
In this paper we present a novel approach to text input on large interactive surfaces using a combination of strategies to resolve the inherent difficulties with text input on su...
Johannes Hirche, Peter Bomark, Mikael Bauer, Pawel...
172
Voted
ACSC
2007
IEEE
15 years 10 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
WISE
2007
Springer
15 years 10 months ago
Learning Implicit User Interests Using Ontology and Search History for Personalization
Abstract. The key for providing a robust context for personalized information retrieval is to build a library which gathers the long term and the short term user’s interests and ...
Mariam Daoud, Lynda Tamine, Mohand Boughanem, Bila...