Sciweavers

637 search results - page 84 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
15 years 8 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
JSSPP
2005
Springer
15 years 7 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
SEMWEB
2004
Springer
15 years 7 months ago
Metadata-Driven Personal Knowledge Publishing
We propose a personal knowledge publishing system called Semblog is realized with integration of Semantic Web techniques and Weblog tools. Semblog suite provides an integrated envi...
Ikki Ohmukai, Hideaki Takeda, Masahiro Hamasaki, K...