Sciweavers

2131 search results - page 83 / 427
» Immunity for Closed Sets
Sort
View
106
Voted
NDSS
2006
IEEE
15 years 6 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....
94
Voted
DATE
2002
IEEE
124views Hardware» more  DATE 2002»
15 years 5 months ago
Crosstalk Alleviation for Dynamic PLAs
—The dynamic programmable logic array (PLA) style has become popular in designing high-performance microprocessors because of its high speed and predictable routing delay. Howeve...
Tzyy-Kuen Tien, Tong-Kai Tsai, Shih-Chieh Chang
94
Voted
ACSAC
2004
IEEE
15 years 4 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
128
Voted
CCS
2008
ACM
15 years 2 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
BIOSTEC
2008
148views Healthcare» more  BIOSTEC 2008»
15 years 2 months ago
Representing and Reasoning with Temporal Constraints in Clinical Trials Using Semantic Technologies
Clinical trial protocols include schedule of clinical trial activities such as clinical tests, procedures, and medications. The schedule specifies temporal constraints on the seque...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...