Sciweavers

40 search results - page 3 / 8
» GridRM: An Extensible Resource Monitoring System
Sort
View
IEEEIA
2009
13 years 3 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
13 years 10 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
ICAC
2007
IEEE
13 years 12 months ago
Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on c...
Balasubramanian Seshasayee, Ripal Nathuji, Karsten...
ACSAC
2004
IEEE
13 years 9 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
MM
2010
ACM
137views Multimedia» more  MM 2010»
13 years 5 months ago
Self-diagnostic peer-assisted video streaming through a learning framework
Quality control and resource optimization are challenging problems in peer-assisted video streaming systems, due to their large scales and unreliable peer behavior. Such systems a...
Di Niu, Baochun Li, Shuqiao Zhao