Sciweavers

2178 search results - page 378 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2009
ACM
15 years 6 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
SIGCOMM
2012
ACM
13 years 4 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
DAC
2008
ACM
16 years 3 months ago
Concurrent topology and routing optimization in automotive network integration
In this paper, a novel automatic approach for the concurrent topology and routing optimization that achieves a high quality network layout is proposed. This optimization is based ...
Bardo Lang, Christian Haubelt, Jürgen Teich, ...
CHI
2009
ACM
16 years 2 months ago
Attaching UI enhancements to websites with end users
We present reform, a system that envisions roles for both programmers and end users in enhancing existing websites to support new goals. First, programmers author a traditional ma...
Michael Toomim, Steven M. Drucker, Mira Dontcheva,...
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
16 years 2 months ago
Supporting entity search: a large-scale prototype search engine
As the Web has evolved into a data-rich repository, with the standard "page view," current search engines are increasingly inadequate. While we often search for various ...
Tao Cheng, Xifeng Yan, Kevin Chen-Chuan Chang