Sciweavers

3639 search results - page 118 / 728
» Provenance as Dependency Analysis
Sort
View
FGCN
2008
IEEE
111views Communications» more  FGCN 2008»
15 years 4 months ago
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
Gérard Wagener, Alexandre Dulaunoy, Thomas ...
EUROCRYPT
2010
Springer
15 years 2 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ISOLA
2010
Springer
14 years 8 months ago
Worst-Case Analysis of Heap Allocations
In object oriented languages, dynamic memory allocation is a fundamental concept. When using such a language in hard real-time systems, it becomes important to bound both the worst...
Wolfgang Puffitsch, Benedikt Huber, Martin Schoebe...
SCAM
2006
IEEE
15 years 4 months ago
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation
This paper addresses the question: “How can animated visualisation be used to express interesting properties of static analysis?” The particular focus is upon static dependenc...
David Binkley, Mark Harman, Jens Krinke