Sciweavers

1610 search results - page 130 / 322
» Identity Based Multisignatures
Sort
View
APSEC
2007
IEEE
15 years 7 months ago
Simultaneous Modification Support based on Code Clone Analysis
Maintaining software systems becomes more difficult as their size and complexity increase. One factor that makes software maintenance more difficult is the presence of code clones...
Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsu...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 7 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
DEXA
2009
Springer
88views Database» more  DEXA 2009»
15 years 7 months ago
Significance-Based Failure and Interference Detection in Data Streams
Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of inte...
Nickolas J. G. Falkner, Quan Z. Sheng
ASPDAC
2008
ACM
115views Hardware» more  ASPDAC 2008»
15 years 5 months ago
An optimal algorithm for sizing sequential circuits for industrial library based designs
In this paper, we propose an optimal gate sizing and clock skew optimization algorithm for globally sizing synchronous sequential circuits. The number of constraints and variables ...
Sanghamitra Roy, Yu Hen Hu, Charlie Chung-Ping Che...
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
15 years 4 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...