Sciweavers

350 search results - page 44 / 70
» An artificial immune system architecture for computer securi...
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 6 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
CCS
2009
ACM
15 years 6 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
ISI
2008
Springer
14 years 10 months ago
Intelligent pattern recognition and biometrics
This talk deals with advanced concepts of Artificial Intelligence (AI) and Pattern Recognition (PR), and their applications to solving real life problems including biometrics appl...
P. Wang
MOBISYS
2008
ACM
15 years 11 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
MIDDLEWARE
2004
Springer
15 years 5 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov