Sciweavers

501 search results - page 3 / 101
» Redundancy and Diversity in Security
Sort
View
AMTA
2004
Springer
13 years 11 months ago
A Structurally Diverse Minimal Corpus for Eliciting Structural Mappings Between Languages
Abstract. We describe an approach to creating a small but diverse corpus in English that can be used to elicit information about any target language. The focus of the corpus is on ...
Katharina Probst, Alon Lavie
SAFECOMP
1999
Springer
13 years 10 months ago
Choosing Effective Methods for Design Diversity - How to Progress from Intuition to Science
Peter T. Popov, Lorenzo Strigini, Alexander B. Rom...
TVLSI
2002
102views more  TVLSI 2002»
13 years 5 months ago
Algorithm level re-computing using implementation diversity: a register transfer level concurrent error detection technique
Concurrent error detection (CED) based on time redundancy entails performing the normal computation and the re-computation at different times and then comparing their results. Time...
Ramesh Karri, Kaijie Wu
DSN
2004
IEEE
13 years 9 months ago
Impact of Path Diversity on Multi-homed and Overlay Networks
Multi-homed and overlay networks are two widely studied approaches aimed at leveraging the inherent redundancy of the Internet's underlying routing infrastructure to enhance ...
Junghee Han, Farnam Jahanian
ASPLOS
2010
ACM
13 years 9 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh