Sciweavers

4109 search results - page 183 / 822
» Issues in Design and Implementation of Multimedia Software S...
Sort
View
USS
2010
15 years 2 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
TCOS
2010
14 years 11 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
JSS
2006
153views more  JSS 2006»
15 years 4 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
IEICET
2006
114views more  IEICET 2006»
15 years 4 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...
ECSQARU
2003
Springer
15 years 9 months ago
A Multi-layered Bayesian Network Model for Structured Document Retrieval
New standards in document representation, like for example SGML, XML, and MPEG-7, compel Information Retrieval to design and implement models and tools to index, retrieve and prese...
Fabio Crestani, Luis M. de Campos, Juan M. Fern&aa...