Sciweavers

5344 search results - page 432 / 1069
» Privacy-Preserving Set Operations
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
CEC
2007
IEEE
15 years 11 months ago
Implicit alternative splicing for genetic algorithms
— In this paper we present a new nature-inspired variation operator for binary encodings in genetic algorithms (GAs). Our method, called implicit alternative splicing (iAS), is r...
Philipp Rohlfshagen, John A. Bullinaria
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
15 years 11 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji
GLOBECOM
2007
IEEE
15 years 11 months ago
Provider Provisioned Overlay Networks and Their Utility in DoS Defense
—The current overlay deployment model supports minimal or no involvement by ISPs in overlay deployment and operation. This model rules out a richer set of interactions between th...
Jinu Kurian, Kamil Saraç
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 11 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila