Sciweavers

2800 search results - page 322 / 560
» Fibrational Control Structures
Sort
View
OSDI
2006
ACM
16 years 3 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
ICCAD
2005
IEEE
113views Hardware» more  ICCAD 2005»
16 years 12 days ago
Synthesis methodology for built-in at-speed testing
We discuss a new synthesis flow, which offers the ability to do easy delay testing almost free in terms of its impact on speed and area as compared to corresponding implementation...
Yinghua Li, Alex Kondratyev, Robert K. Brayton
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
15 years 10 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
CIDM
2009
IEEE
15 years 10 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
151
Voted
SASO
2009
IEEE
15 years 10 months ago
Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies
Abstract—Unstructured peer-to-peer networks can be extremely flexible, but, because of size, complexity, and high variability in peers’ capacity and reliability, it is a conti...
Paul L. Snyder, Rachel Greenstadt, Giuseppe Valett...