Sciweavers

1496 search results - page 141 / 300
» Definability of Initial Segments
Sort
View
CADE
2005
Springer
16 years 5 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
VLDB
1998
ACM
103views Database» more  VLDB 1998»
15 years 9 months ago
The Drill Down Benchmark
Data Mining places specific requirements on DBMS query performance that cannot be evaluated satisfactorily using existing OLAP benchmarks. The DD Benchmark - defined here - provid...
Peter A. Boncz, Tim Rühl, Fred Kwakkel
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 9 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ASPDAC
2007
ACM
115views Hardware» more  ASPDAC 2007»
15 years 9 months ago
Model-based Programming Environment of Embedded Software for MPSoC
- A noble model-based programming environment of embedded software for MPSoC is proposed. By defining a common intermediate code (CIC), it separates modeling of the software and im...
Soonhoi Ha
CONEXT
2008
ACM
15 years 6 months ago
Overlay routing using coordinate systems
We address the problem of finding indirect overlay paths that reduce the latency between pairs of nodes in an overlay. To this end we propose to rely on an Internet Coordinate Sys...
François Cantin, Bamba Gueye, Dali Kaafar, ...