Sciweavers

1636 search results - page 293 / 328
» Detecting similar software applications
Sort
View
ACSAC
2002
IEEE
15 years 7 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
123
Voted
ICPPW
2002
IEEE
15 years 6 months ago
MigThread: Thread Migration in DSM Systems
Distributed Shared Memory (DSM) systems provide a logically shared memory over physically distributed memory to enable parallel computation on Networks of Workstations (NOWs). In ...
Hai Jiang, Vipin Chaudhary
DAC
1999
ACM
15 years 6 months ago
Common-Case Computation: A High-Level Technique for Power and Performance Optimization
This paper presents a design methodology, called common-case computation (CCC), and new design automation algorithms for optimizing power consumption or performance. The proposed ...
Ganesh Lakshminarayana, Anand Raghunathan, Kamal S...
AAAI
2008
15 years 4 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
DGO
2007
134views Education» more  DGO 2007»
15 years 3 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...