Sciweavers

185 search results - page 37 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
ICPR
2010
IEEE
13 years 5 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
INFOCOM
2007
IEEE
14 years 17 days ago
Optimal Provisioning of Elastic Service Availability
Abstract— Service availability is one of the most closely scrutinized metrics in offering network services. It is important to costeffectively provision a managed and differentia...
Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderba...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 6 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 1 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 6 days ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...