Sciweavers

1615 search results - page 138 / 323
» Distributed Forward Checking
Sort
View
153
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 8 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
IEEEPACT
2005
IEEE
15 years 8 months ago
Extended Whole Program Paths
We describe the design, generation and compression of the extended whole program path (eWPP) representation that not only captures the control flow history of a program execution...
Sriraman Tallam, Rajiv Gupta, Xiangyu Zhang
RTAS
2003
IEEE
15 years 7 months ago
Real-Time Support for Mobile Robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies,...
Huan Li, John Sweeney, Krithi Ramamritham, Roderic...
104
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
112
Voted
CSR
2008
Springer
15 years 4 months ago
Comparing Universal Covers in Polynomial Time
The universal cover TG of a connected graph G is the unique (possible infinite) tree covering G, i.e., that allows a locally bijective homomorphism from TG to G. Universal covers h...
Jirí Fiala, Daniël Paulusma