Sciweavers

53302 search results - page 10253 / 10661
» On the design of a
Sort
View
USS
2004
15 years 3 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
USS
2004
15 years 3 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
WICSA
2001
15 years 3 months ago
A Highly-Extensible, XML-Based Architecture Description Language
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Eric M. Dashofy, André van der Hoek, Richar...
WSC
2001
15 years 3 months ago
Satellite communications representation in network simulation
This paper presents methodologies to represent satellite communications (SATCOM) behaviors in network simulation. This paper is based on tasks performed for generic network warfar...
Kenneth Y. Jo
105
Voted
WSC
2001
15 years 3 months ago
Dimensionality analysis of a simulation outcome space
This paper investigates the dimensionality characteristics of the outcome space of a combat simulation. The independent state variables of all of the outcome states for a simulati...
John B. Gilmer Jr., Frederick J. Sullivan
« Prev « First page 10253 / 10661 Last » Next »