Sciweavers

7778 search results - page 1456 / 1556
» Designing Controllers for Reachability
Sort
View
ACSAC
2009
IEEE
15 years 10 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
122
Voted
BSN
2009
IEEE
171views Sensor Networks» more  BSN 2009»
15 years 10 months ago
DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications
We present an open-source platform for wireless body sensor networks called DexterNet. The system supports real-time, persistent human monitoring in both indoor and outdoor enviro...
Philip Kuryloski, Annarita Giani, Roberta Giannant...
SI3D
2009
ACM
15 years 10 months ago
Crowd patches: populating large-scale virtual environments for real-time applications
Populating virtual environments (VEs) with large crowds is a subject that has been tackled for several years. Solutions have been proposed to offer realistic trajectories as well ...
Barbara Yersin, Jonathan Maïm, Julien Pettr&e...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 10 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
CSFW
2009
IEEE
15 years 10 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
« Prev « First page 1456 / 1556 Last » Next »