Sciweavers

283 search results - page 46 / 57
» Software Inspections We Can Trust
Sort
View
JOT
2006
80views more  JOT 2006»
14 years 9 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
78
Voted
ASPLOS
2012
ACM
13 years 5 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
ACSAC
2005
IEEE
15 years 3 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
WWW
2008
ACM
15 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
BMCBI
2008
93views more  BMCBI 2008»
14 years 9 months ago
MPDA: Microarray pooled DNA analyzer
Background: Microarray-based pooled DNA experiments that combine the merits of DNA pooling and gene chip technology constitute a pivotal advance in biotechnology. This new techniq...
Hsin-Chou Yang, Mei-Chu Huang, Ling-Hui Li, Chien-...