Sciweavers

1757 search results - page 50 / 352
» Secure Content Validation
Sort
View
80
Voted
EUROSYS
2006
ACM
15 years 8 months ago
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices
Usage-awaRe Interactive Content Adaptation (URICA) is an automatic technique that adapts content for display on mobile devices based on usage semantics. URICA allows users who are...
Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara
PODC
2005
ACM
15 years 4 months ago
Advanced contention management for dynamic software transactional memory
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
William N. Scherer III, Michael L. Scott
ISW
2009
Springer
15 years 5 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
83
Voted
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 3 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
ICN
2009
Springer
15 years 5 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...