Sciweavers

1028 search results - page 70 / 103
» Using Attack Graphs to Design Systems
Sort
View
112 views 100 votes 15 years 4 months ago  ITS 2000»
We developed a distributed support model in an interface for distant learning. The support is integrated into the ExploraGraph navigator which makes it possible to navigate through...
118 views 173 votes 16 years 1 months ago  SIGMOD 2008»
Freebase is a practical, scalable tuple database used to structure general human knowledge. The data in Freebase is collaboratively created, structured, and maintained. Freebase c...
129 views 105 votes 15 years 7 months ago  MSS 2007»
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
163 views 119 votes 15 years 8 months ago  ESORICS 2009»
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
141 views 107 votes 15 years 4 months ago  HHCI 2000»
In this paper we discuss the design of computer-based haptic graphs for blind and visually impaired people with the support of our preliminary experimental results. Since visual i...
146 views 112 votes 16 years 2 months ago  DAC 2007»
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
308 views 135 votes 14 years 11 months ago  SIGMOD 2010»
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
135 views 101 votes 15 years 7 months ago  CODES 2006»
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
130 views 107 votes 15 years 7 months ago  SAFECOMP 2007»
With the rapid progress in science and technology, we find ubiquitous use of safety-critical systems in avionics, consumer electronics, and medical instruments. In such systems, u...
108 views 117 votes 15 years 6 months ago  HT 2005»
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...