Sciweavers

52 search results - page 3 / 11
» On the effectiveness of the metamorphic shield
Sort
View
56
Voted
JCC
2008
67views more  JCC 2008»
14 years 9 months ago
Systematic investigation on the geometric dependence of the calculated nuclear magnetic shielding constants
: We perform a systematic examination on the dependence of the calculated nuclear magnetic shielding constants on the chosen geometry for a selective set of density functional meth...
Ying Zhang, Xin Xu, Yijing Yan
98
Voted
ICST
2011
IEEE
14 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
HPCA
2006
IEEE
15 years 10 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ICRA
2003
IEEE
103views Robotics» more  ICRA 2003»
15 years 2 months ago
Highly compliant and self-tightening docking modules for precise and fast connection of self-reconfigurable robots
― This paper describes a new docking system called Compliant-And-Self-Tightening (CAST) developed as an effective and efficient connector for joining and releasing modules of sel...
Behrokh Khoshnevis, Peter M. Will, Wei-Min Shen
RAID
2007
Springer
15 years 3 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi