Sciweavers

1112 search results - page 172 / 223
» Executing Abstract Test Cases
Sort
View
NOMS
2008
IEEE
15 years 4 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SEMCO
2008
IEEE
15 years 4 months ago
TcruziKB: Enabling Complex Queries for Genomic Data Exploration
We developed a novel analytical environment to aid in the examination of the extensive amount of interconnected data available for genome projects. Our focus is to enable ity and ...
Pablo N. Mendes, Bobby McKnight, Amit P. Sheth, Je...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
IPPS
2006
IEEE
15 years 4 months ago
A hierarchical scheduling model for component-based real-time systems
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
José L. Lorente, Giuseppe Lipari, Enrico Bi...
SENSYS
2006
ACM
15 years 4 months ago
Protothreads: simplifying event-driven programming of memory-constrained embedded systems
Event-driven programming is a popular model for writing programs for tiny embedded systems and sensor network nodes. While event-driven programming can keep the memory overhead do...
Adam Dunkels, Oliver Schmidt, Thiemo Voigt, Muneeb...