Sciweavers

1523 search results - page 131 / 305
» Detecting and Sketching the Common
Sort
View
IPPS
2006
IEEE
15 years 4 months ago
Decentralized runtime analysis of multithreaded applications
Violations of a number of common safety properties of multithreaded programs–such as atomicity and absence of dataraces–cannot be observed by looking at the linear execution t...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
ACSAC
2001
IEEE
15 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ETFA
2008
IEEE
14 years 11 months ago
Green surveillance applications
Currently, falling prices in technologies associated with surveillance applications has led to a huge increase in their use in all types of environments, although the most common ...
Javier Silvestre-Blanes
IJDE
2006
77views more  IJDE 2006»
14 years 10 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
MTA
2007
83views more  MTA 2007»
14 years 9 months ago
A study on multimedia documents behavior: a notion of equivalence
Abstract. In this paper we address the problem of comparing multimedia documents, which can be described according to different reference models. If we consider presentations as c...
Paola Bertolotti, Ombretta Gaggi