Sciweavers

8486 search results - page 1523 / 1698
» Ordered Enumeration Method
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 11 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
STACS
2007
Springer
15 years 11 months ago
Wavelength Management in WDM Rings to Maximize the Number of Connections
Abstract. We study computationally hard combinatorial problems arising from the important engineering question of how to maximize the number of connections that can be simultaneous...
Ioannis Caragiannis
TACAS
2007
Springer
99views Algorithms» more  TACAS 2007»
15 years 11 months ago
"Don't Care" Modeling: A Logical Framework for Developing Predictive System Models
Analysis of biological data often requires an understanding of components of pathways and/or networks and their mutual dependency relationships. Such systems are often analyzed and...
Hillel Kugler, Amir Pnueli, Michael J. Stern, E. J...
VLDB
2007
ACM
128views Database» more  VLDB 2007»
15 years 11 months ago
A genetic approach for random testing of database systems
Testing a database engine has been and continues to be a challenging task. The space of possible SQL queries along with their possible access paths is practically unbounded. Moreo...
Hardik Bati, Leo Giakoumakis, Steve Herbert, Aleks...
ACSAC
2006
IEEE
15 years 11 months ago
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
« Prev « First page 1523 / 1698 Last » Next »