Sciweavers

883 search results - page 74 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
BMCBI
2007
159views more  BMCBI 2007»
14 years 10 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...
PACT
2005
Springer
15 years 3 months ago
On Evaluating the Performance of Security Protocols
Abstract. We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign...
Chiara Bodei, Mikael Buchholtz, Michele Curti, Pie...
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
AFRIGRAPH
2004
ACM
15 years 3 months ago
The visualisation of application delay metrics for a customer network
– Application services are fundamental network components that allow organizations the ability to operate efficiently. It has become essential for organizations to monitor the pe...
Janet Wesson, Darelle van Greunen, Justin Rademan
ULPAA
1994
143views Hardware» more  ULPAA 1994»
14 years 11 months ago
Configuring Function-based Communication Protocols for Multimedia Applications
Next generation communication systems must support diverse applications operating over high-performance local, metropolitan, and wide area networks. This paper describes a framewo...
Douglas C. Schmidt, Burkhard Stiller, Tatsuya Suda...