Sciweavers

1523 search results - page 209 / 305
» Detecting and Sketching the Common
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
KBSE
2007
IEEE
15 years 4 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
LCN
2007
IEEE
15 years 4 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
ROMAN
2007
IEEE
131views Robotics» more  ROMAN 2007»
15 years 4 months ago
Real-time acoustic source localization in noisy environments for human-robot multimodal interaction
— Interaction between humans involves a plethora of sensory information, both in the form of explicit communication as well as more subtle unconsciously perceived signals. In ord...
Vlad M. Trifa, Ansgar Koene, Jan Morén, Gor...
SAINT
2007
IEEE
15 years 4 months ago
Data Management on Grid Filesystem for Data-Intensive Computing
In parallel computing environments such as HPC clusters and the Grid, data-intensive applications involve large overhead costs due to a concentration of access to the files on co...
Hitoshi Sato, Satoshi Matsuoka