Sciweavers

1116 search results - page 164 / 224
» Applying Predicate Abstraction to Abstract State Machines
Sort
View
NOMS
2008
IEEE
15 years 5 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
90
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 5 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...
CAISE
2007
Springer
15 years 5 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
ISAAC
2007
Springer
135views Algorithms» more  ISAAC 2007»
15 years 5 months ago
Fast Evaluation of Union-Intersection Expressions
Abstract. We show how to represent sets in a linear space data structure such that expressions involving unions and intersections of sets can be computed in a worst-case efficient ...
Philip Bille, Anna Pagh, Rasmus Pagh
COMPSAC
2005
IEEE
15 years 4 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine