Sciweavers

5690 search results - page 1124 / 1138
» A Position Control System Design
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
HICSS
2006
IEEE
98views Biometrics» more  HICSS 2006»
15 years 8 months ago
Electricity Markets: How Many, Where and When?
Most markets compromise the economist’s ideal of matching the marginal benefits to consumers with the marginal cost of supply for incremental purchases because individual buyers...
Nodir Adilov, Richard E. Schuler
ASPLOS
2006
ACM
15 years 7 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
ISPAN
2005
IEEE
15 years 7 months ago
A Self-stabilizing Link-Cluster Algorithm in Mobile Ad Hoc Networks
We design a self-stabilizing cluster routing algorithm based on the link-cluster architecture of wireless ad hoc networks. The network is divided into clusters. Each cluster has a...
Doina Bein, Ajoy Kumar Datta, Chakradhar R. Jaggan...
MSR
2005
ACM
15 years 7 months ago
Collaboration using OSSmole: a repository of FLOSS data and analyses
This paper introduces a collaborative project OSSmole which collects, shares, and stores comparable data and analyses of free, libre and open source software (FLOSS) development f...
Megan Conklin, James Howison, Kevin Crowston
« Prev « First page 1124 / 1138 Last » Next »