Sciweavers

42 search results - page 1 / 9
» Characterization of Error-Tolerant Applications when Protect...
Sort
View
IISWC
2006
IEEE
14 years 17 days ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...
HICSS
2007
IEEE
86views Biometrics» more  HICSS 2007»
14 years 26 days ago
Visualization and Characterization of Stability Swings via GPS-Synchronized Data
: This paper provides a methodology to characterize the accuracy of PMU data (GPS-synchronized) and the applicability of this data for monitoring system stability via visualization...
George J. Cokkinides, A. P. Sakis Meliopoulos, Geo...
CCS
2010
ACM
13 years 6 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
WEBI
2004
Springer
13 years 12 months ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
SASO
2008
IEEE
14 years 28 days ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...