Sciweavers

5326 search results - page 19 / 1066
» On what we can ensure
Sort
View
105
Voted
AINA
2007
IEEE
15 years 6 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
99
Voted
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 7 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
ICPADS
2006
IEEE
15 years 6 months ago
Ensuring Fairness Among Participating Clusters During Multi-site Parallel Job Scheduling
Multi-cluster schedulers can dramatically improve average job turn-around time performance by making use of fragmented node resources available throughout the grid. By carefully m...
William M. Jones, Walter B. Ligon III
72
Voted
WSC
2000
15 years 1 months ago
Ensuring the successful adoption of discrete event simulation in a manufacturing environment
Discrete event simulation has long been recognized as a valuable tool for manufacturers, but converting the recognition of value into an embrace of the technology can be a challen...
J. Michael Knoll, Joseph A. Heim
90
Voted
FASE
2009
Springer
15 years 7 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel