Sciweavers

132 search results - page 24 / 27
» Asynchronous policy evaluation and enforcement
Sort
View
RAID
2007
Springer
13 years 12 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
DIMVA
2008
13 years 7 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
AIPS
2008
13 years 8 months ago
Learning Relational Decision Trees for Guiding Heuristic Planning
The current evaluation functions for heuristic planning are expensive to compute. In numerous domains these functions give good guidance on the solution, so it worths the computat...
Tomás de la Rosa, Sergio Jiménez, Da...
ADHOC
2008
111views more  ADHOC 2008»
13 years 6 months ago
MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks
Sensor network MAC protocols typically sacrifice packet latency to achieve energy efficiency. Such delays may well increase due to routing protocol operation. For this reason it i...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Raja Ju...
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 6 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis