Sciweavers

1028 search results - page 76 / 103
» Using Attack Graphs to Design Systems
Sort
View
131 views 139 votes 15 years 7 months ago  ACISP 2006»
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
184 views 102 votes 14 years 11 months ago  RAID 2010»
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
125 views 115 votes 15 years 6 months ago  ICSM 2003»
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
157 views 116 votes 15 years 7 months ago  ACSC 2005»
The global dynamics of automata networks (such as neural networks) are a function of their topology and the choice of automata used. Evolutionary methods can be applied to the opt...
116 views 128 votes 16 years 2 months ago  DAC 2007»
Abstract. Embedded multimedia systems often run multiple time-constrained applications simultaneously. These systems use multiprocessor systems-on-chip of which it must be guarante...
119 views 100 votes 15 years 6 months ago  IWPC 2002»
Program understanding tools manipulate program represensuch as abstract syntax trees, control-flow graphs, or data-flow graphs. This paper deals with the use of visitor combinat...
108 views 100 votes 15 years 7 months ago  HICSS 2007»
The SmartCampus initiative aims to turn an urban university campus into a living laboratory for location aware community system services. To lay a foundation for this effort, the ...
174 views 154 votes 14 years 11 months ago  TAOSD 2010»
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
131 views 110 votes 15 years 6 months ago  RTSS 2003»
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
166 views 111 votes 14 years 11 months ago  SOCIALCOM 2010»
It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in, for example, the increasing number ...