Sciweavers

4764 search results - page 369 / 953
» Applications of Error-Control Coding
Sort
View
ECOOP
2009
Springer
16 years 3 months ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
AP2PS
2009
IEEE
15 years 10 months ago
FLaCoSt: A Novel Peer to Peer Architecture for Video Streaming in a Next Generation Network
Abstract—This paper proposes a peer-to-peer video streaming delivery system within the framework of Next Generation Networks using Application Level Multicast. Increased efficie...
Jaime García-Reinoso, Alex Bikfalvi, Iv&aac...
DSN
2006
IEEE
15 years 9 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
WSE
2006
IEEE
15 years 9 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
ICCSA
2005
Springer
15 years 8 months ago
Variability Design and Customization Mechanisms for COTS Components
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Soo Dong Kim, Hyun Gi Min, Sung Yul Rhew