Sciweavers

2024 search results - page 226 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
129
Voted
DIMVA
2010
15 years 5 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
169
Voted
CAL
2006
15 years 3 months ago
Adopting system call based address translation into user-level communication
User-level communication alleviates the software overhead of the communication subsystem by allowing applications to access the network interface directly. For that purpose, effici...
Moon-Sang Lee, Sang-Kwon Lee, Joonwon Lee, Seung R...
117
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Secure Smart Homes using Jini and UIUC SESAME
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
116
Voted
FSKD
2005
Springer
88views Fuzzy Logic» more  FSKD 2005»
15 years 9 months ago
Fuzzy Virtual Coupling Design for High Performance Haptic Display
Conventional virtual coupling is designed mainly for stabilizing the virtual environment (VE) and it thus may have poor performances. This paper proposes a novel adaptive virtual c...
D. Bi, Jun Zhang, G. L. Wang
135
Voted
SCOPES
2007
Springer
15 years 9 months ago
Optimization of dynamic data structures in multimedia embedded systems using evolutionary computation
Embedded consumer devices are increasing their capabilities and can now implement new multimedia applications reserved only for powerful desktops a few years ago. These applicatio...
David Atienza, Christos Baloukas, Lazaros Papadopo...