Sciweavers

101 search results - page 5 / 21
» Automatic Architecture Hardening Using Safety Patterns
Sort
View
NDSS
2006
IEEE
15 years 5 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
84
Voted
ECOOP
2006
Springer
15 years 3 months ago
Automatic Prefetching by Traversal Profiling in Object Persistence Architectures
Object persistence architectures support transparent access to persistent objects. For efficiency, many of these architectures support queries that can prefetch associated objects ...
Ali Ibrahim, William R. Cook
SCP
2008
144views more  SCP 2008»
14 years 11 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
ATS
1998
IEEE
170views Hardware» more  ATS 1998»
15 years 3 months ago
A Ring Architecture Strategy for BIST Test Pattern Generation
This paper presents a new effective Built-In Self Test (BIST) scheme that achieves 100% fault coverage with low area overhead, and without any modification of the circuit under tes...
Christophe Fagot, Olivier Gascuel, Patrick Girard,...
ICIAP
2005
ACM
15 years 11 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero