Sciweavers

457 search results - page 31 / 92
» Construction of a Highly Dependable Operating System
Sort
View
OSDI
2004
ACM
15 years 10 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
DFT
2008
IEEE
86views VLSI» more  DFT 2008»
15 years 4 months ago
Enhancing Silicon Debug via Periodic Monitoring
Scan-based debug methods give high observability of internal signals, however, they require halting the system to scan out responses from the circuit-under-debug (CUD). This is ti...
Joon-Sung Yang, Nur A. Touba
PLDI
2011
ACM
14 years 17 days ago
Data representation synthesis
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is both declarative lts in provably correct code. In our approach, abst...
Peter Hawkins, Alex Aiken, Kathleen Fisher, Martin...
STACS
2010
Springer
15 years 4 months ago
Intrinsic Universality in Self-Assembly
We show that the Tile Assembly Model exhibits a strong notion of universality where the goal is to give a single tile assembly system that simulates the behavior of any other tile...
David Doty, Jack H. Lutz, Matthew J. Patitz, Scott...