Sciweavers

1030 search results - page 199 / 206
» Stateful Detection in High Throughput Distributed Systems
Sort
View
CCS
2005
ACM
15 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
SRDS
2008
IEEE
15 years 4 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
CCE
2006
14 years 9 months ago
Modeling and temperature control of rapid thermal processing
In the past few years, Rapid Thermal Processes (RTP) have gained acceptance as mainstream technology for semi-conductors manufacturing. These processes are characterized by a sing...
Eyal Dassau, Benyamin Grosman, Daniel R. Lewin
SC
1995
ACM
15 years 1 months ago
Lazy Release Consistency for Hardware-Coherent Multiprocessors
Release consistency is a widely accepted memory model for distributed shared memory systems. Eager release consistency represents the state of the art in release consistent protoc...
Leonidas I. Kontothanassis, Michael L. Scott, Rica...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su