Sciweavers

414 search results - page 49 / 83
» Secure Border Control Processes
Sort
View
CCS
2008
ACM
15 years 1 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 6 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
CDES
2006
62views Hardware» more  CDES 2006»
15 years 1 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
JCS
2002
115views more  JCS 2002»
14 years 11 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
ICIAP
2007
ACM
15 years 12 months ago
A robust measure for visual correspondence
In this paper a novel measure for visual correspondence is proposed, to be adopted for common computer vision tasks such as pattern matching, stereo vision, change detection. The ...
Federico Tombari, Luigi di Stefano, Stefano Mattoc...