Sciweavers

94 search results - page 18 / 19
» Attacks on Copyright Marking Systems
Sort
View
JSAC
2006
115views more  JSAC 2006»
13 years 5 months ago
Deployment of an Algorithm for Large-Scale Topology Discovery
Abstract-- Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, the research community has not examined the p...
Benoit Donnet, Philippe Raoult, Timur Friedman, Ma...
CCS
2009
ACM
14 years 16 days ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
CSMR
2009
IEEE
14 years 15 days ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
ICMI
2003
Springer
160views Biometrics» more  ICMI 2003»
13 years 11 months ago
Sensitivity to haptic-audio asynchrony
The natural role of sound in actions involving mechanical impact and vibration suggests the use of auditory display as an augmentation to virtual haptic interfaces. In order to bu...
Bernard D. Adelstein, Durand R. Begault, Mark R. A...
SPRINGSIM
2007
13 years 7 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...