The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Acting in a dynamic environment is a complex task that requires several issues to be investigated, with the aim of controlling the associated search complexity. In this paper, a l...
In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach ...
Brian Noble, Mahadev Satyanarayanan, Dushyanth Nar...