Sciweavers

270 search results - page 28 / 54
» Building Software Securely from the Ground Up
Sort
View
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
14 years 10 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 4 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 7 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
SECON
2008
IEEE
15 years 4 months ago
Gateway Design for Data Gathering Sensor Networks
—Innovation in gateways for data gathering sensor networks has lagged compared to advances in mote-class devices, leaving us with a limited set of options for deploying such syst...
Raluca Musaloiu-Elefteri, Razvan Musaloiu-Elefteri...
C5
2003
IEEE
15 years 3 months ago
Croquet - A Collaboration System Architecture
1 Croquet [18] is a computer software architecture built from the ground up with a focus on deep collaboration between teams of users. It is a totally open, totally free, highly p...
David A. Smith, Alan C. Kay, Andreas Raab, David P...