Sciweavers

727 search results - page 95 / 146
» One line and n points
Sort
View
80
Voted
CCS
2008
ACM
15 years 4 days ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
PERVASIVE
2010
Springer
15 years 3 days ago
Studying the Use and Utility of an Indoor Location Tracking System for Non-experts
Abstract. Indoor location tracking systems have been a major focus of ubiquitous computing research, and they have much promise to help in collecting objective, real time data for ...
Shwetak N. Patel, Julie A. Kientz, Sidhant Gupta
114
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Highly Memory-Efficient LogLog Hash for Deep Packet Inspection
As the network line rates reach 40 Gbps today and 100 Gbps in the near future, performing deep packet inspection (DPI) in the Network Intrusion Detection and Prevention Systems (NI...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
CORR
2010
Springer
188views Education» more  CORR 2010»
14 years 10 months ago
A unified framework for high-dimensional analysis of $M$-estimators with decomposable regularizers
High-dimensional statistical inference deals with models in which the the number of parameters p is comparable to or larger than the sample size n. Since it is usually impossible ...
Sahand Negahban, Pradeep Ravikumar, Martin J. Wain...
ADHOC
2007
134views more  ADHOC 2007»
14 years 10 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu