Sciweavers

3299 search results - page 570 / 660
» Privacy and Trusted Computing
Sort
View
127
Voted
DAC
2009
ACM
15 years 10 months ago
Accurate temperature estimation using noisy thermal sensors
Multicore SOCs rely on runtime thermal measurements using on-chip sensors for DTM. In this paper we address the problem of estimating the actual temperature of on-chip thermal sen...
Yufu Zhang, Ankur Srivastava
CSE
2009
IEEE
15 years 10 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
155
Voted
NDSS
2009
IEEE
15 years 10 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
GROUP
2009
ACM
15 years 10 months ago
All My People Right Here, Right Now: management of group co-presence on a social networking site
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
Airi Lampinen, Sakari Tamminen, Antti Oulasvirta
162
Voted
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
A study on user acceptance of error visualization techniques
Location-based services in general require information about the position of certain objects. For instance, for a navigation service the position of the user needs to be known. Th...
Hendrik Lemelson, Thomas King, Wolfgang Effelsberg