Sciweavers

1028 search results - page 181 / 206
» Using Attack Graphs to Design Systems
Sort
View
110
Voted
CC
2004
Springer
15 years 8 months ago
Region-Based Partial Dead Code Elimination on Predicated Code
Abstract. This paper presents the design, implementation and experimental evaluation of a practical region-based partial dead code elimination (PDE) algorithm on predicated code in...
Qiong Cai, Lin Gao 0002, Jingling Xue
117
Voted
APVIS
2003
15 years 4 months ago
Visualising Class Cohesion with Virtual Worlds
High cohesion, or module strength, indicates that a system has been well partitioned into components which have strong internal relationships. An understanding of cohesion is an i...
Neville Churcher, Warwick Irwin, Ronald D. Kriz
153
Voted
SIGMOD
2004
ACM
165views Database» more  SIGMOD 2004»
16 years 2 months ago
Industrial-Strength Schema Matching
Schema matching identifies elements of two given schemas that correspond to each other. Although there are many algorithms for schema matching, little has been written about build...
Philip A. Bernstein, Sergey Melnik, Michalis Petro...
121
Voted
HPCA
2007
IEEE
16 years 3 months ago
Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications
Chip multiprocessors with multiple simpler cores are gaining popularity because they have the potential to drive future performance gains without exacerbating the problems of powe...
Hongtao Zhong, Steven A. Lieberman, Scott A. Mahlk...
EUROCRYPT
2010
Springer
15 years 7 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...