Sciweavers

854 search results - page 120 / 171
» Addressing Dynamic Issues of Program Model Checking
Sort
View
ICSE
2005
IEEE-ACM
16 years 2 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
POLICY
2005
Springer
15 years 7 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
117
Voted
CONEXT
2007
ACM
15 years 6 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure
152
Voted
IPPS
2007
IEEE
15 years 8 months ago
Formal Analysis for Debugging and Performance Optimization of MPI
High-end computing is universally recognized to be a strategic tool for leadership in science and technology. A significant portion of high-end computing is conducted on clusters...
Ganesh Gopalakrishnan, Robert M. Kirby
126
Voted
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
15 years 6 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...