Sciweavers

232 search results - page 45 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
70
Voted
MOBISYS
2010
ACM
14 years 12 months ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
76
Voted
CCS
2008
ACM
14 years 11 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
77
Voted
DIMVA
2010
14 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
75
Voted
FLAIRS
1998
14 years 11 months ago
Investigating the Validity of a Test Case Selection Methodology for Expert System Validation
Providing assurances of performance is an important aspect of successful development and commercialization of expert systems. However, this can only be done if the quality of the ...
Jan-Eike Michels, Thomas Abel, Rainer Knauf, Aveli...
ACL
1997
14 years 11 months ago
Paradigmatic Cascades: a Linguistically Sound Model of Pronunciation by Analogy
We present and experimentally evaluate a new model of pronunciation by analogy: the paradigmatic cascades model. Given a pronunciation lexicon, this algorithm first extracts the m...
François Yvon