Sciweavers

2236 search results - page 238 / 448
» Secure Software Design in Practice
Sort
View
CN
2007
137views more  CN 2007»
15 years 3 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ACSAC
2010
IEEE
15 years 1 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CHI
1998
ACM
15 years 7 months ago
The Progress Portfolio: Designing Reflective Tools for a Classroom Context
A great deal of effort has gone into developing open-ended inquiry activities for science education as well as complex computer tools for accessing scientific data to help student...
Ben Loh, Josh Radinsky, Eric Russell, Louis M. Gom...
130
Voted
JSA
2008
108views more  JSA 2008»
15 years 3 months ago
A methodology to design arbitrary failure detectors for distributed protocols
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process crash represents only a particular faulty behavior. Handling tougher failures (...
Roberto Baldoni, Jean-Michel Hélary, Sara T...
125
Voted
COMSWARE
2007
IEEE
15 years 7 months ago
Efficient Design of End-to-End Probes for Source-Routed Networks
Migration to a converged network has caused service providers to deploy real time applications such as voice over an IP (VoIP) network. From the provider's perspective, the s...
Srinivasan Parthasarathya, Rajeev Rastogi, Marina ...