Sciweavers

1852 search results - page 82 / 371
» Block-level link analysis
Sort
View
95
Voted
CIS
2007
Springer
15 years 6 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang
IEEEPACT
2002
IEEE
15 years 5 months ago
Speculative Alias Analysis for Executable Code
Optimizations performed at link time or directly applied to final program executables have received increased attention in recent years. Such low-level optimizations can benefit...
Manel Fernández, Roger Espasa
91
Voted
ASAP
2006
IEEE
89views Hardware» more  ASAP 2006»
15 years 4 months ago
Polyhedral Modeling and Analysis of Memory Access Profiles
In this paper, we propose to model memory access profile information as loop nests exhibiting useful characteristics on the memory behavior, such as periodicity, linearly linked m...
Philippe Clauss, Bénédicte Kenmei
98
Voted
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
14 years 11 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
106
Voted
TELETRAFFIC
2007
Springer
15 years 6 months ago
Performance Analysis of a Fluid Queue with Random Service Rate in Discrete Time
We consider a fluid queue in discrete time with random service rate. Such a queue has been used in several recent studies on wireless networks where the packets can be arbitrarily...
Onno J. Boxma, Vinod Sharma, D. K. Prasad