Sciweavers

497 search results - page 1 / 100
» Spies among us
Sort
View
CACM
2010
65views more  CACM 2010»
13 years 5 months ago
Spies among us?
Samuel Greengard
APSEC
2002
IEEE
13 years 10 months ago
Lessons Learned in Framework-Based Software Process Improvement
Software process improvement (SPI) has emerged as a critical area for organizations involved in software development. There is now considerable evidence that SPI can provide subst...
Pankaj Jalote
IEEEARES
2008
IEEE
13 years 11 months ago
Using Non-adaptive Group Testing to Construct Spy Agent Routes
We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is show...
Georgios Kalogridis, Chris J. Mitchell
CONCUR
2005
Springer
13 years 10 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
SIGMETRICS
1992
ACM
128views Hardware» more  SIGMETRICS 1992»
13 years 9 months ago
MemSpy: Analyzing Memory System Bottlenecks in Programs
To cope with the increasing difference between processor and main memory speeds, modern computer systems use deep memory hierarchies. In the presence of such hierarchies, the perf...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...