Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
- This paper investigates issues on culture and websites design for e-commerce, and also relates them to advanced requirements engineering practices. E-commerce parishioners and us...
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...