Sciweavers

22358 search results - page 4189 / 4472
» Software Performance Engineering
Sort
View
127
Voted
SACRYPT
2007
Springer
15 years 10 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
ACSAC
2006
IEEE
15 years 10 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
102
Voted
ACSC
2006
IEEE
15 years 10 months ago
Rendering multi-perspective images with trilinear projection
Non-linear projections of 3D graphical scenes can be used to compute reflections and refractions in curved surfaces, draw artistic images in the style of Escher or Picasso, and p...
Scott Vallance, Paul R. Calder
141
Voted
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
15 years 10 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 10 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
« Prev « First page 4189 / 4472 Last » Next »