Sciweavers

1030 search results - page 176 / 206
» Happenings
Sort
View
69
Voted
CCS
2006
ACM
15 years 1 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
ECOOP
2004
Springer
15 years 1 months ago
A Reflective Approach to Dynamic Software Evolution
In this paper, we present a solution that allows systems to remain active while they are evolving. Our approach goes out from the principle of separated concerns and has two steps....
Peter Ebraert, Tom Tourwé
EUPROJECTS
2006
Springer
15 years 1 months ago
Human Computer Confluence
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...
Alois Ferscha, Stefan Resmerita, Clemens Holzmann
CCS
2001
ACM
15 years 1 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
76
Voted
KR
2000
Springer
15 years 1 months ago
Significant Inferences : Preliminary Report
We explore the possibility of a logic where a conclusion substantially improves over its premise(s): Specifically, we intend to rule out inference steps such that the premise conv...
Philippe Besnard, Torsten Schaub