Sciweavers

3302 search results - page 611 / 661
» Software Is More Than Code
Sort
View
139
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
107
Voted
IEEEPACT
2009
IEEE
15 years 10 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
120
Voted
ISCA
2009
IEEE
137views Hardware» more  ISCA 2009»
15 years 10 months ago
A case for an interleaving constrained shared-memory multi-processor
Shared-memory multi-threaded programming is inherently more difficult than single-threaded programming. The main source of complexity is that, the threads of an application can in...
Jie Yu, Satish Narayanasamy
130
Voted
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 10 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
150
Voted
SACMAT
2009
ACM
15 years 10 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang