Sciweavers

861 search results - page 110 / 173
» Symbolic Program Analysis Using Term Rewriting and Generaliz...
Sort
View
WWW
2007
ACM
16 years 3 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
GECCO
2006
Springer
144views Optimization» more  GECCO 2006»
15 years 6 months ago
Towards estimating nadir objective vector using evolutionary approaches
Nadir point plays an important role in multi-objective optimization because of its importance in estimating the range of objective values corresponding to desired Pareto-optimal s...
Kalyanmoy Deb, Shamik Chaudhuri, Kaisa Miettinen
VIZSEC
2004
Springer
15 years 8 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
CN
2007
137views more  CN 2007»
15 years 3 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
CHARME
2001
Springer
133views Hardware» more  CHARME 2001»
15 years 7 months ago
View from the Fringe of the Fringe
Formal analysis remains outside the mainstream of system design practice. Interactive methods and tools are regarded by some to be on the margin of useful research in this area. Al...
Steven D. Johnson