Sciweavers

2251 search results - page 440 / 451
» Specification and Implementation Problems for C
Sort
View
DAC
1994
ACM
15 years 6 months ago
Exact Minimum Cycle Times for Finite State Machines
In current research, the minimum cycle times of finite state machines are estimated by computing the delays of the combinational logic in the finite state machines. Even though th...
William K. C. Lam, Robert K. Brayton, Alberto L. S...
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 5 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
COMPSAC
2004
IEEE
15 years 5 months ago
Testing Context-Sensitive Middleware-Based Software Applications
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves accor...
T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Ts...
WEBDB
2000
Springer
128views Database» more  WEBDB 2000»
15 years 5 months ago
Architecting a Network Query Engine for Producing Partial Results
The growth of the Internet has made it possible to query data in all corners of the globe. This trend is being abetted by the emergence of standards for data representation, such ...
Jayavel Shanmugasundaram, Kristin Tufte, David J. ...