Sciweavers

690 search results - page 66 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
126
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
15 years 9 months ago
Implementation of an Agent Architecture for Automated Index Tuning
It has been important to extend database management systems to support new requirements of applications and administration. We focus in this paper on the automatic tuning feature,...
Rogério Luís de Carvalho Costa, S&ea...
166
Voted
ICMAS
2000
15 years 5 months ago
Architecture-Centric Object-Oriented Design Method for Multi-Agent Systems
s This paper introduces an architecture-centric object-oriented design method for MAS (Multi-Agent Systems) using the extended UML (Unified Modeling Language). The UML extension is...
Hongsoon Yim, Kyehyun Cho, Sung Joo Park, Jongwoo ...
134
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
BMCBI
2011
14 years 11 months ago
CODA (CrossOver Distribution Analyzer): quantitative characterization of crossover position patterns along chromosomes
Background: During meiosis, homologous chromosomes exchange segments via the formation of crossovers. This phenomenon is highly regulated; in particular, crossovers are distribute...
Franck Gauthier, Olivier C. Martin, Matthieu Falqu...