Sciweavers

1947 search results - page 317 / 390
» Reconsidering power management
Sort
View
WORM
2003
15 years 1 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
IJCAI
1993
15 years 1 months ago
Diagnosing and Solving Over-Determined Constraint Satisfaction Problems
Constraint relaxation is a frequently used technique for managing over-determined constraint satisfaction problems. A problem in constraint relaxation is the selection of the appr...
R. R. Bakker, F. Dikker, F. Tempelman, P. M. Wognu...
DBSEC
2009
130views Database» more  DBSEC 2009»
15 years 28 days ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
GLOBECOM
2008
IEEE
15 years 28 days ago
A Cognitive Framework for Improving Coexistence Among Heterogeneous Wireless Networks
—The proliferation of wireless systems requires that the coexistence between heterogeneous technologies be addressed. This paper presents a cognitive framework in which sensingba...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 1 days ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...