Sciweavers

751 search results - page 90 / 151
» The Distinguishing Chromatic Number
Sort
View
FOSSACS
2009
Springer
15 years 6 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 6 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
WCRE
2009
IEEE
15 years 6 months ago
Tracking Design Smells: Lessons from a Study of God Classes
—“God class” is a term used to describe a certain type of large classes which “know too much or do too much”. Often a God class (GC) is created by accident as functionali...
Stéphane Vaucher, Foutse Khomh, Naouel Moha...
KESAMSTA
2009
Springer
15 years 5 months ago
An Approximate Model for Bidders in Sequential Automated Auctions
In this paper, we propose a probabilistic model to study the interaction of bidder and seller agents in sequential automated auctions. We consider a designated “special bidder”...
Erol Gelenbe, Kumaara Velan
APLAS
2009
ACM
15 years 5 months ago
Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation
We present a simple algorithmic extension of the classical call-strings approach to mitigate substantial performance degradation caused by spurious interprocedural cycles. Spuriou...
Hakjoo Oh