Sciweavers

8177 search results - page 477 / 1636
» Detecting System Emulators
Sort
View
USS
2008
15 years 7 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
168
Voted
SIGSOFT
2007
ACM
16 years 5 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
TMC
2010
210views more  TMC 2010»
15 years 3 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
150
Voted
DSN
2009
IEEE
15 years 11 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman
FAST
2010
15 years 7 months ago
HydraFS: A High-Throughput File System for the HYDRAstor Content-Addressable Storage System
A content-addressable storage (CAS) system is a valuable tool for building storage solutions, providing efficiency by automatically detecting and eliminating duplicate blocks; it ...
Cristian Ungureanu, Benjamin Atkin, Akshat Aranya,...