Sciweavers

878 search results - page 136 / 176
» A Compiler-Based Approach to Data Security
Sort
View
ATAL
2004
Springer
15 years 3 months ago
Agents Swarming in Semantic Spaces to Corroborate Hypotheses
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
MSS
1999
IEEE
140views Hardware» more  MSS 1999»
15 years 2 months ago
Pursuit of a Scalable High Performance Multi-Petabyte Database
When the BaBar experiment at the Stanford Linear Accelerator Center starts in April 1999, it will generate approximately 200TB/year of data at a rate of 10MB/sec for 10 years. A m...
Andrew Hanushevsky, Marcia Nowark
RTSS
1999
IEEE
15 years 2 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
ESORICS
2009
Springer
15 years 4 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
INFOCOM
2009
IEEE
15 years 4 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer