Sciweavers

807 search results - page 129 / 162
» Deploying and evaluating a location-aware system
Sort
View
TWC
2008
142views more  TWC 2008»
14 years 9 months ago
Robust Ultra-Wideband Signal Acquisition
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...
Ersen Ekrem, Mutlu Koca, Hakan Deliç
SIN
2010
ACM
14 years 7 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
SOCIALCOM
2010
14 years 7 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 6 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos