Sciweavers

1028 search results - page 60 / 103
» Using Attack Graphs to Design Systems
Sort
View
111 views 122 votes 16 years 2 months ago  DAC 2006»
Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute i...
100 views 114 votes 15 years 7 months ago  LCTRTS 2007»
Existing methods place data or code in scratchpad memory, i.e., SPM by either relying on heuristics or resorting to integer programming or mapping it to a graph coloring problem. ...
160 views 102 votes 15 years 6 months ago  DATE 2010»
— In this paper, we examine the impact of application task mapping on the reliability of MPSoC in the presence of single-event upsets (SEUs). We propose a novel soft erroraware d...
132 views 97 votes 15 years 6 months ago  ATAL 2005»
We are concerned with the use of Mobile Agents for information retrieval. A multi-agent system is considered; a number of agents are involved in a collective effort to retrieve di...
119 views 118 votes 15 years 7 months ago  AINA 2008»
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
155 views 116 votes 14 years 11 months ago  ML 2010»
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
186 views 117 votes 15 years 3 months ago  CCS 2008»
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
242 views 118 votes 14 years 11 months ago  ACSAC 2010»
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
210 views 124 votes 15 years 6 months ago  VR 2002»
This paper focuses on the distributed architecture of the collaborative augmented reality system Studierstube. The system allows multiple users to experience a shared 3D workspace...
129 views 103 votes 15 years 10 months ago  SOSP 2007»
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...