Sciweavers

2237 search results - page 440 / 448
» On the Security of Random Sources
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
PLDI
2003
ACM
15 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
78
Voted
DRM
2003
Springer
15 years 2 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
AINA
2010
IEEE
15 years 2 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie