Endre søk
Begrens søket
4567 301 - 317 of 317
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 301.
    Taylor, Stephen
    et al.
    Columbia University.
    Lowry, Andy
    Columbia University.
    Maguire Jr., Gerald Q.
    Columbia University.
    Stolfo, Salvatore J.
    Columbia University.
    Logic Programming using Parallel Associative Operations1984Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In order to provide performance improvements in the execution of large logic programs, it is highly desirable to investigate the relationships between logic, data-base systems and knowledge-based systems in the context of massively parallel architectures. This paper presents a model for the interpretation of logic programs in this type of environment and overviews the algorithms under development. An interpreter that implements the model has been demonstrated in simulations on a number of small programs. Implementation requires only a small set of hardware primitives be available, these have been successfully implemented on a working prototype machines. DADO Current research aims to develop the model into a practical and efficient logic programming system for use on the machine.

  • 302.
    Taylor, Stephen
    et al.
    Columbia University, Department of Computer Science.
    Maguire Jr., Gerald Q.
    Columbia University, Department of Computer Science.
    Stolfo, Salvatore J.
    Columbia University, Department of Computer Science.
    Lowry, Andy
    Columbia University, Department of Computer Science.
    Analyzing prolog programs1984Rapport (Annet vitenskapelig)
  • 303.
    van Biema, Michael K.
    et al.
    Columbia University, Department of Computer Sceince.
    Lerner, Mark D.
    Columbia University, Department of Computer Science.
    Maguire Jr., Gerald Q.
    Columbia University, Department of Computer Science.
    Stolfo, Salvatore J.
    Columbia University, Department of Computer Science.
    ||PSL: A Parallel Lisp for the DADO Machine1984Rapport (Annet vitenskapelig)
  • 304.
    Vatn, Jon-Olov
    et al.
    KTH, Tidigare Institutioner, Teleinformatik.
    Maguire Jr., Gerald Q.
    KTH, Tidigare Institutioner, Teleinformatik.
    The Effect of Using Co-Located Care-of Addresses on Macro Handover Latency1998Inngår i: 14th Nordic Tele-traffic Seminar, 1998Konferansepaper (Fagfellevurdert)
    Fulltekst (pdf)
    fulltext
  • 305.
    Weidenhielm, Lars
    et al.
    Karolinska Institutet at Karolinska University Hospital Solna.
    Olivecrona, Henrik
    Karolinska Institutet, Sweden.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Noz, Marilyn E.
    New York University, Department of Radiology.
    Prosthetic liner wear in total hip replacement: a longitudinal 13-year study with computed tomography.2018Inngår i: Skeletal Radiology, ISSN 0364-2348, E-ISSN 1432-2161, s. 1-5Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This case report follows a woman who had a total hip replacement in 1992 when she was 45 years old. Six serial computed tomography (CT) examinations over a period of 13 years provided information that allowed her revision surgery to be limited to liner replacement as opposed to replacement of the entire prosthesis. Additionally, they provided data that ruled out the presence of osteolysis and indeed none was found at surgery. In 2004, when the first CT was performed, the 3D distance the femoral head had penetrated into the cup was determined to be 2.6 mm. By 2017, femoral head penetration had progressed to 5.0 mm. The extracted liner showed wear at the thinnest part to be 5.5 mm, as measured with a micrometer. The use of modern CT techniques can identify problems, while still correctable without major surgery. Furthermore, the ability of CT to assess the direction of wear revealed that the liner wear changed from the cranial to dorsal direction.

  • 306. West, J.
    et al.
    Fitzpatrick, J.M.
    Wang, M.Y.
    Dawant, B.M.
    Maurer Jr., C.R.
    Kessler, R.M.
    Maciunas, R.J.
    Barillot, C.
    Lemoine, D.
    Collignon, A.
    Maes, F.
    Suetens, P.
    Vandermeulen, D.
    van den Elsen, P.A.
    Napel, S.
    Sumanaweera, T.S.
    Harkness, B.
    Hemler, P.F.
    Hill, D.L.G.
    Hawkes, D.J.
    Studholme, C.
    Maintz, J.B.A.
    Viergever, M.A.
    Malandain, G.
    Pennac, X.
    Noz, Marilyn E.
    New York University.
    Maguire Jr., Gerald Q.
    Pollack, M.
    Pelizzari, C.A.
    Robb, R.A.
    Hanson, D.
    Woods, R.P.
    Comparison and evaluation of retrospective intermodality brain image registration techniques1997Inngår i: Journal of computer assisted tomography, ISSN 0363-8715, E-ISSN 1532-3145, Vol. 21, nr 4, s. 554-566Artikkel i tidsskrift (Fagfellevurdert)
  • 307. West, Jay B.
    et al.
    Fitzpatrick, J. Michael
    Wang, Mathew Y.
    Dawant, Benoit M.
    Maurer Jr., Calvin R.
    Kessler, Robert M.
    Maciunas, Robert J.
    Barillot, Christian
    Lemoine, Didier
    Collignon, Andre M. F.
    Maes, Fredrik
    Suetens, Paul
    Vandermeulen, Dirk
    Elsen, Petra A van den
    Hemler, Paul F.
    Napel, Sandy
    Sumanaweera, Thilaka S.
    Harkness, Beth A.
    Hill, Derek L.
    Studholme, Colin
    Malandain, Gregoire
    Pennec, Xavier
    Noz, Marilyn E.
    Maguire Jr., Gerald Q.
    KTH, Tidigare Institutioner, Teleinformatik.
    Pelizzari, Charles A.
    Robb, Richard A.
    Hanson, Dennis P.
    Woods, R. P.
    Comparison and evaluation of retrospective intermodality image registration techniques1997Inngår i: SPIE - The International Society for Optical Engineering, SPIE - International Society for Optical Engineering, 1997, Vol. 2710, s. 332-347Konferansepaper (Fagfellevurdert)
    Abstract [en]

    All retrospective image registration methods have attached to them some intrinsic estimate of registration error. However, this estimate of accuracy may not always be a good indicator of the distance between actual and estimated positions of targets within the cranial cavity. This paper describes a project whose principal goal is to use a prospective method based on fiducial markers as a ’gold standard’ to perform an objective, blinded evaluation of the accuracy of several retrospective image-to-image registration techniques. Image volumes of three modalities – CT, MR, and PET – were taken of patients undergoing neurosurgery at Vanderbilt University Medical Center. These volumes had all traces of the fiducial markers removed, and were provided to project collaborators outside Vanderbilt, who then performed retrospective registrations on the volumes, calculating transformations from CT to MR and/or from PET to MR, and communicated their transformations to Vanderbilt where the accuracy of each registration was evaluated. In this evaluation the accuracy is measured at multiple ’regions of interest,’ i.e. areas in the brain which would commonly be areas of neurological interest. A region is defined in the MR image and its centroid C is determined. Then the prospective registration is used to obtain the corresponding point C’ in CT or PET. To this point the retrospective registration is then applied, producing C’ in MR. Statistics are gathered on the target registration error (TRE), which is the disparity between the original point C and its corresponding point C’. A second goal of the project is to evaluate the importance of correcting geometrical distortion in MR images, by comparing the retrospective TRE in the rectified images, i.e., those which have had the distortion correction applied, with that of the same images before rectification. This paper presents preliminary results of this study along with a brief description of each registration technique and an estimate of both preparation and execution time needed to perform the registration.

  • 308.
    Wu, Jiang
    et al.
    KTH, Tidigare Institutioner, Teleinformatik.
    Maguire Jr., Gerald Q.
    KTH, Tidigare Institutioner, Teleinformatik.
    Agent Based Seamless IP Multicast Receiver Handover2000Inngår i: Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications, Deventer, The Netherlands: Kluwer, B.V. , 2000, s. 213-226Konferansepaper (Fagfellevurdert)
  • 309.
    Yalew, Sileshi Demesie
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS. Universidade de Lisboa, Portugal.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Correia, Miguel
    Universidade de Lisboa, Portugal.
    Light-SPD: a platform to prototype secure mobile applications2016Inngår i: Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO '16), New York, NY, USA: Association for Computing Machinery (ACM), 2016, s. 11-20Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Securely storing sensitive personal data is critical for protecting privacy. Currently, many persons use smartphones to store their private data. However, smartphones suffer from many security issues. To overcome this situation, the PCAS project is designing a secure personal storage device called the Secure Portable Device (SPD), to be attached to a smartphone for securely storing sensitive personal data. However, this device is unavailable, closed, and expensive to deploy for prototyping applications. We propose a platform that emulates the SPD and the smartphone using a board with an ARM processor with the TrustZone security extension. This platform is open, inexpensive, and secure. A payment application is used as an example to show the platform's capabilities. As a proof-of-concept, we implemented this platform and provide a performance evaluation using a i.MX53 board.

  • 310.
    Yalew, Sileshi Demesie
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Haridi, Seif
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS.
    Correia, Miguel
    INESC-ID & Instituto Superior Tecnico, Portugal.
    DroidPosture: A Trusted Posture Assessment Service for Mobile Devices2017Inngår i: Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Institute of Electrical and Electronics Engineers (IEEE), 2017, s. 1-8Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Mobile devices such as smartphones are becoming the majority among computing devices. Currently, millions of persons use such devices to store and process personal data. Unfortunately, smartphones running Android are increasingly being targeted by hackers and infected with malware. Antimalware software is being used to address this situation, but it may be subverted by the same malware it aims to detect.

    We present DROIDPOSTURE, a posture assessment service for Android devices. This service aims to securely evaluate the level of trust we can have on a device (assess its posture) even if the mobile OS is compromised. For that to be possible, DROIDPOSTURE is protected using TrustZone, a security extension for ARM processors. DROIDPOSTURE is configurable with a set of application and kernel analysis mechanisms that enable detecting malicious applications and rootkits. We implemented a DROIDPOSTURE prototype using a hardware board with an ARM processor with TrustZone, and evaluated its performance and security.

  • 311.
    Yalew, Sileshi Demesie
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT). Univ Lisbon, INESC ID, Inst Super Tecn, Lisbon, Portugal.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Haridi, Seif
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Correia, Miguel
    INESC-ID & Instituto Superior Tecnico, Portugal.
    Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid2017Inngår i: 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017 / [ed] Gkoulalasdivanis, A Correia, MP Avresky, DR, Institute of Electrical and Electronics Engineers (IEEE), 2017, Vol. 2017, s. 351-358Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the dissemination of Android ransomware. Ransomware is a class of malware that makes data inaccessible by blocking access to the device or, more frequently, by encrypting the data; to recover the data, the user has to pay a ransom to the attacker. A solution for this problem is to backup the data. Although backup tools are available for Android, these tools may be compromised or blocked by the ransomware itself. This paper presents the design and implementation of RANSOMSAFEDROID, a TrustZone based backup service for mobile devices. RANSOMSAFEDROID is protected from malware by leveraging the ARM TrustZone extension and running in the secure world. It does backup of files periodically to a secure local persistent partition and pushes these backups to external storage to protect them from ransomware. Initially, RANSOMSAFEDROID does a full backup of the device filesystem, then it does incremental backups that save the changes since the last backup. As a proof-of-concept, we implemented a RANSOMSAFEDROID prototype and provide a performance evaluation using an i.MX53 development board.

  • 312.
    Yalew, Sileshi Demesie
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Haridi, Seif
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS.
    Correia, Miguel
    Universidade de Lisboa, Portugal..
    T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications2017Inngår i: Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Institute of Electrical and Electronics Engineers (IEEE), 2017, s. 240-247, artikkel-id 8029446Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Android has become the most widely used mobile operating system (OS) in recent years. There is much research on methods for detecting malicious Android applications. Dynamic analysis methods detect such applications by evaluating their behaviour during execution. However, such mechanisms may be ineffective as malware is often able to disable antimalware software. This paper presents the design of T2DROID, a dynamic analyser for Android that uses traces of Android API function calls and kernel syscalls, and that is protected from malware by leveraging the ARM TrustZone security extension. In our experimental evaluation T2DROID achieved accuracy and precision of 0.98 and 0.99, respectively, with a kNN classifier.

  • 313.
    Yalew, Sileshi Demesie
    et al.
    Univ Lisbon, Inst Super Tecn, INESD ID, Lisbon, Portugal.
    Mendonca, Pedro
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Haridi, Seif
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Correia, Miguel
    TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps2017Inngår i: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2017Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In less than a decade, mobile apps became an integral part of our lives. In several situations it is important to provide assurance that a mobile app is authentic, i.e., that it is indeed the app produced by a certain company. However, this is challenging, as such apps can be repackaged, the user malicious, or the app tampered with by an attacker. This paper presents the design of TRUAPP, a software authentication service that provides assurance of the authenticity and integrity of apps running on mobile devices. TRUAPP provides such assurance, even if the operating system is compromised, by leveraging the ARM TrustZone hardware security extension. TRUAPP uses a set of techniques (static watermarking, dynamic watermarking, and cryptographic hashes) to verify the integrity of the apps. The service was implemented in a hardware board that emulates a mobile device, which was used to do a thorough experimental evaluation of the service.

  • 314.
    Yen, Jonathan
    et al.
    Hewlett-Packard Research Laboratory.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Saw, Chit Wei
    Hewlett-Packard Research Laboratory.
    Yihong, Xu
    Hewlett-Packard Research Laboratory.
    Authenticatable graphical bar codes2000Patent (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.

  • 315.
    Yen, Jonathan
    et al.
    Hewlett-Packard Research Laboratory.
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Saw, Chit Wei
    Hewlett-Packard Research Laboratory.
    Yihong, Xu
    Hewlett-Packard Research Laboratory.
    Method of encoding a handwritten signature2000Patent (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information (12) to be encoded, and a base image (22) is modulated with a graphical encoding of the signed message to produce a marked image (14). In another aspect, a signed message is extracted from a marked image (14) and a base image (22). The extracted signed message is decoded to produce a decoded message. Information (12) encoded in the marked image (14) is extracted from the decoded message and authenticated.

  • 316. Zeleznik, Michael P.
    et al.
    Maguire Jr., Gerald Q.
    Baxter, Brent S.
    University of Utah.
    PACS Data-base Design1983Inngår i: Proceedings of the Society of Photo-Optical Instrumentation Engineers, ISSN 0361-0748, Vol. 418, s. 287-295Artikkel i tidsskrift (Fagfellevurdert)
  • 317. Zeleznik, Michael P.
    et al.
    Maguire Jr., Gerald Q.
    Baxter, Brent S.
    University of Utah.
    Noz, Marilyn E.
    New York University.
    Schimpf, James H.
    New York University.
    Horii, Steven C.
    New York University.
    PACS User Level Requirements1983Inngår i: Proceedings of the Society of Photo-Optical Instrumentation Engineers, ISSN 0361-0748, Vol. 418, s. 172-177Artikkel i tidsskrift (Fagfellevurdert)
4567 301 - 317 of 317
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf