Sciweavers

87 search results - page 8 / 18
» Publicly Detectable Techniques for the Protection of Virtual...
Sort
View
DAC
2005
ACM
15 years 10 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
DRM
2003
Springer
15 years 2 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
MOBISYS
2008
ACM
15 years 9 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
ICDCS
2003
IEEE
15 years 2 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
83
Voted
ICIP
2009
IEEE
15 years 10 months ago
A Variational Framework For 3d Colonic Polyp Visualization In Virtual Colonoscopy
Colorectal cancer includes cancer of the colon, rectum, anus and appendix. Since it is largely preventable, it is extremely important to detect and treat the colorectal cancer in ...