Sciweavers

63 search results - page 3 / 13
» Investigating user account control practices
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
13 years 12 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
CORR
2007
Springer
111views Education» more  CORR 2007»
13 years 5 months ago
A New Perspective on Multi-user Power Control Games in Interference Channels
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
Yi Su, Mihaela van der Schaar
EUROSYS
2009
ACM
14 years 2 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
CSREAEEE
2006
98views Business» more  CSREAEEE 2006»
13 years 6 months ago
Cultural and Requirement Aspects on International E-commerce sites
- This paper investigates issues on culture and websites design for e-commerce, and also relates them to advanced requirements engineering practices. E-commerce parishioners and us...
Kyeong Kang, João Araújo
JSAC
2008
106views more  JSAC 2008»
13 years 5 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...