Sciweavers

701 search results - page 107 / 141
» Aligning traces for performance evaluation
Sort
View
71
Voted
CCS
2003
ACM
15 years 4 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
HASE
2002
IEEE
15 years 4 months ago
Coyote: An XML-Based Framework for Web Services Testing
Web services received significant attention recently and several important web service platforms such as .NET are now available. The testing and evaluation of web services are imp...
Wei-Tek Tsai, Raymond A. Paul, Weiwei Song, Zhibin...
INFOCOM
2002
IEEE
15 years 4 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
ISCA
2002
IEEE
95views Hardware» more  ISCA 2002»
15 years 4 months ago
An Instruction Set and Microarchitecture for Instruction Level Distributed Processing
An instruction set architecture (ISA) suitable for future microprocessor design constraints is proposed. The ISA has hierarchical register files with a small number of accumulator...
Ho-Seop Kim, James E. Smith
SACMAT
2010
ACM
15 years 4 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller