Sciweavers

1186 search results - page 118 / 238
» A New Approach to Secure Logging
Sort
View
IEEEIAS
2007
IEEE
15 years 7 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
WISA
2004
Springer
15 years 6 months ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...
93
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
99
Voted
OOPSLA
1990
Springer
15 years 4 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller
SODA
2010
ACM
248views Algorithms» more  SODA 2010»
15 years 10 months ago
Approximating the Crossing Number of Graphs Embeddable in Any Orientable Surface
The crossing number of a graph is the least number of pairwise edge crossings in a drawing of the graph in the plane. We provide an O(n log n) time constant factor approximation al...
Petr Hlineny, Markus Chimani