Sciweavers

3047 search results - page 192 / 610
» A Secure Distributed Search System
Sort
View
137
Voted
WSC
2000
15 years 5 months ago
An agent-based framework for linking distributed simulations
Simulations often operate on static datasets and data sources, but many simulations would benefit from access to dynamic data. This paper describes our work developing a software ...
Linda F. Wilson, Daniel Burroughs, Jeanne Sucharit...
PERCOM
2010
ACM
15 years 2 months ago
GeoKad: A P2P distributed localization protocol
—The widespread use of tracking and localization systems may be hindered by centralized server platforms whose performance can hardly scale up to the needs of very large numbers ...
Marco Picone, Michele Amoretti, Francesco Zanichel...
112
Voted
MODELS
2007
Springer
15 years 9 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
120
Voted
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 9 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
130
Voted
SOSP
2007
ACM
16 years 15 days ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...