Sciweavers

1975 search results - page 370 / 395
» Property analysis and design understanding
Sort
View
LISA
2007
15 years 4 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
FLAIRS
2001
15 years 3 months ago
Autonomy for SOHO Ground Operations
/Background The SOLAR and HELIOSPHERIC OBSERVATORY (SOHO) project [SOHO Web Page] is being carried out by the European Space Agency (ESA) and the US National Aeronautics and Space ...
Walt Truszkowski, Nick Netreba, Don Ginn, Sanda Ma...
USENIX
2004
15 years 3 months ago
Making the "Box" Transparent: System Call Performance as a First-Class Result
For operating system intensive applications, the ability of designers to understand system call performance behavior is essential to achieving high performance. Conventional perfo...
Yaoping Ruan, Vivek S. Pai
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
15 years 3 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
BMCBI
2010
93views more  BMCBI 2010»
15 years 2 months ago
Hybridization thermodynamics of NimbleGen Microarrays
Background: While microarrays are the predominant method for gene expression profiling, probe signal variation is still an area of active research. Probe signal is sequence depend...
Ulrike Mückstein, Germán G. Leparc, Al...