Sciweavers

21324 search results - page 4026 / 4265
» Making the case for computing
Sort
View
145
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Constructing a metacircular Virtual machine in an exploratory programming environment
Can virtual machine developers benefit from religiously observing the principles more often embraced for exploratory programming? To find out, we are concurrently constructing two...
David Ungar, Adam Spitz, Alex Ausch
110
Voted
RAID
2005
Springer
15 years 9 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
135
Voted
VIZSEC
2005
Springer
15 years 9 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
119
Voted
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 9 months ago
iMeMex: Escapes from the Personal Information Jungle
Modern computer work stations provide thousands of applications that store data in >100.000 files on the file system of the underlying OS. To handle these files data process...
Jens-Peter Dittrich, Marcos Antonio Vaz Salles, Do...
145
Voted
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
« Prev « First page 4026 / 4265 Last » Next »