Sciweavers

2757 search results - page 430 / 552
» On separating systems
Sort
View
IH
2004
Springer
15 years 9 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
LCTRTS
2004
Springer
15 years 9 months ago
Link-time optimization of ARM binaries
The overhead in terms of code size, power consumption and execution time caused by the use of precompiled libraries and separate compilation is often unacceptable in the embedded ...
Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Domin...
SAS
2004
Springer
15 years 9 months ago
Generalized Records and Spatial Conjunction in Role Logic
Role logic is a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of role logic corresponds to two-va...
Viktor Kuncak, Martin C. Rinard
CHI
2010
ACM
15 years 9 months ago
Brain, body and bytes: psychophysiological user interaction
The human brain and body are prolific signal generators. Recent technologies and computing techniques allow us to measure, process and interpret these signals. We can now infer su...
Audrey Girouard, Erin Treacy Solovey, Regan L. Man...