Sciweavers

15375 search results - page 2635 / 3075
» cans 2008
Sort
View
SP
2008
IEEE
13 years 11 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...
SRDS
2008
IEEE
13 years 11 months ago
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn mod...
Steven Y. Ko, Imranul Hoque, Indranil Gupta
SRDS
2008
IEEE
13 years 11 months ago
Towards Reliable Reputations for Dynamic Networked Systems
A new generation of distributed systems and applications rely on the cooperation of diverse user populations motivated by self-interest. While they can utilize “reputation syste...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
SRDS
2008
IEEE
13 years 11 months ago
Dynamically Quantifying and Improving the Reliability of Distributed Storage Systems
In this paper, we argue that the reliability of large-scale storage systems can be significantly improved by using better reliability metrics and more efficient policies for rec...
Rekha Bachwani, Leszek Gryz, Ricardo Bianchini, Ce...
SRDS
2008
IEEE
13 years 11 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...
« Prev « First page 2635 / 3075 Last » Next »