Sciweavers

224 search results - page 13 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
98
Voted
IWNAS
2008
IEEE
15 years 6 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
ECCC
2010
98views more  ECCC 2010»
14 years 10 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
RTCSA
2000
IEEE
15 years 4 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 6 months ago
Identifying Organizational Knowledge Paths through Social Network Lens: Synthesis of Multi-Industry Case Studies
Unlike the common belief that knowledge flows mainly along the formal organizational hierarchy, recent research has pointed out an informal social network among organizational mem...
Young-Gul Kim, Sung-Byung Yang, Yong-Sauk Hau, Jeo...
111
Voted
DAC
2007
ACM
16 years 20 days ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...