Sciweavers

3428 search results - page 72 / 686
» Making the Case
Sort
View
USS
2010
14 years 8 months ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
125
Voted
SIGSOFT
2010
ACM
14 years 5 months ago
Evolution of a bluetooth test application product line: a case study
In this paper, we study the decision making process involved in the five year lifecycle of a Bluetooth software product produced by a large, multi-national test and measurement fi...
Narayan Ramasubbu, Rajesh Krishna Balan
119
Voted
COMSUR
2011
251views Hardware» more  COMSUR 2011»
13 years 10 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
96
Voted
KBSE
2009
IEEE
15 years 5 months ago
A Case for Automated Debugging Using Data Structure Repair
—Automated debugging is becoming increasingly important as the size and complexity of software increases. This paper makes a case for using constraint-based data structure repair...
Muhammad Zubair Malik, Khalid Ghori, Bassem Elkara...
IPPS
2006
IEEE
15 years 4 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti