Sciweavers

473 search results - page 73 / 95
» Heapable Sequences and Subsequences
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
INFOCOM
2009
IEEE
15 years 8 months ago
Graceful Network Operations
—A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational...
Saqib Raza, Yuanchen Zhu, Chen-Nee Chuah
SSD
2009
Springer
145views Database» more  SSD 2009»
15 years 8 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 8 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ISWC
2006
IEEE
15 years 8 months ago
Discovering Characteristic Actions from On-Body Sensor Data
We present an approach to activity discovery, the unsupervised identification and modeling of human actions embedded in a larger sensor stream. Activity discovery can be seen as ...
David Minnen, Thad Starner, Irfan A. Essa, Charles...