Sciweavers

1949 search results - page 132 / 390
» Protective Interface Specifications
Sort
View
117
Voted
CN
2004
106views more  CN 2004»
15 years 1 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
101
Voted
EL
2002
134views more  EL 2002»
15 years 1 months ago
Security issues in online games
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
Jianxin Jeff Yan, Hyun-Jin Choi
ASPLOS
2012
ACM
13 years 9 months ago
Providing safe, user space access to fast, solid state disks
Emerging fast, non-volatile memories (e.g., phase change memories, spin-torque MRAMs, and the memristor) reduce storage access latencies by an order of magnitude compared to state...
Adrian M. Caulfield, Todor I. Mollov, Louis Alex E...
FORTE
2009
14 years 11 months ago
Using First-Order Logic to Reason about Submodule Construction
We consider the following problem: For a system consisting of two components, the behavior of one component is known as well as the desired global behavior. What should be the beha...
Gregor von Bochmann
QUATIC
2007
IEEE
15 years 8 months ago
A Vision for International Standardization in Software and Systems Engineering
The importance of standards in enabling the development of industry and commerce through the standardization of components, interfaces and specifications is well known and underst...
François Coallier