Zobrazeno 1 - 10
of 116
pro vyhledávání: '"Liviu Iftode"'
Publikováno v:
IEEE Access, Vol 4, Pp 3617-3631 (2016)
From today's conventional cars to tomorrow's self-driving cars, advances in technology will enable vehicles to be equipped with more and more-sophisticated sensing devices, such as cameras. As vehicles gain the ability to act as mobile sensors that c
Externí odkaz:
https://doaj.org/article/0b8c59b1469047269367ef6266459684
Publikováno v:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1:1-27
A main challenge faced by the state-of-the-art parking sensing systems is to infer the state of the spots not covered by participants’ parking/unparking events (called background availability) when the system penetration rate is limited. In this pa
Autor:
Ruilin Liu, Daehan Kwak, Hongzhang Liu, Liviu Iftode, Cristian Borcea, Yong Xiang, Badri Nath
Publikováno v:
Ad Hoc Networks. 37:14-28
Navigators based on real-time traffic conditions achieve suboptimal results since, in face of congestion, they greedily shift drivers to currently light-traffic roads and cause new traffic jams. This article presents Themis, a participatory system na
Publikováno v:
IEEE Access, Vol 4, Pp 3617-3631 (2016)
From today’s conventional cars to tomorrow’s self-driving cars, advances in technology will enable vehicles to be equipped with more and more-sophisticated sensing devices, such as cameras. As vehicles gain the ability to act as mobile sensors th
Publikováno v:
AutomotiveUI
Remote driving brings human operators with sophisticated perceptual and cognitive skills into an over-the-network control loop, with the hope of addressing the challenging aspects of vehicular autonomy based exclusively on artificial intelligence (AI
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:1230-1242
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and inspect pages containing code and data of a target system under study. To avoid being infected by malicious or compromised targets, state-of-the-art sys
Publikováno v:
ACM Transactions on Computer Systems. 31:1-25
This article investigates the transient use of free local storage for improving performance in VM-based mobile computing systems implemented as thick clients on host PCs. We use the term TransientPC systems to refer to these types of systems. The sol
Autor:
Ahmad-Reza Sadeghi, Christopher Liebchen, Liviu Iftode, Ferdinand Brasser, Vinod Ganapathy, Daeyoung Kim
Publikováno v:
MobiSys
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthori
Autor:
Junsuk Shin, R. Sivakumar, Ramesh Jain, Kirak Hong, Liviu Iftode, Rajnish Kumar, Umakishore Ramachandran, Kurt Rothermel
Publikováno v:
Proceedings of the IEEE. 100:878-892
Sensors of various modalities and capabilities, especially cameras, have become ubiquitous in our environment. Their intended use is wide ranging and encompasses surveillance, transportation, entertainment, education, healthcare, emergency response,
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 8:670-684
Rootkits affect system security by modifying kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structures, such as the system call table and values of function pointers, recent work has demonst