Sciweavers

505 search results - page 72 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
82
Voted
DSN
2007
IEEE
15 years 4 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
DSN
2007
IEEE
15 years 4 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
DEXAW
2006
IEEE
95views Database» more  DEXAW 2006»
15 years 3 months ago
Optimising Performance in Network-Based Information Systems: Virtual Organisations and Customised Views
Network-based information systems use well-defined standards to ensure interoperability and also have a tightly coupled relationship between their internal data representation an...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
15 years 3 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
MM
1996
ACM
168views Multimedia» more  MM 1996»
15 years 1 months ago
CVEPS - A Compressed Video Editing and Parsing System
Processing digital video directly in the compressed domain has many advantages in terms of storage efficiency, speed, and video quality. We have developed a compressed video editi...
Jianhao Meng, Shih-Fu Chang