Sciweavers

4307 search results - page 600 / 862
» Dynamic Spyware Analysis
Sort
View
113
Voted
IWIA
2005
IEEE
15 years 6 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
92
Voted
AI
2005
Springer
15 years 6 months ago
Generating Adaptive Multimedia Presentations Based on a Semiotic Framework
Abstract. We propose a framework for generating adaptive multimedia presentations through the dynamic selection of files from a large data repository. The presentation is generate...
Osama El Demerdash, Sabine Bergler, Leila Kosseim,...
105
Voted
ATAL
2005
Springer
15 years 6 months ago
Simulating data dissemination techniques for local reputation systems
In distributed scenarios the robustness of a reputation mechanism depends on the data available for computation. Especially in ad-hoc networks the amount of available data is rest...
Andreas Schlosser, Marco Voss
CHES
2005
Springer
129views Cryptology» more  CHES 2005»
15 years 6 months ago
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment
Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results sh...
Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng L...
91
Voted
FIMH
2005
Springer
15 years 6 months ago
Suppression of IVUS Image Rotation. A Kinematic Approach
IntraVascular Ultrasound (IVUS) is an exploratory technique used in interventional procedures that shows cross section images of arteries and provides qualitative information about...
Misael Rosales, Petia Radeva, Oriol Rodriguez, Deb...