Sciweavers

1028 search results - page 92 / 103
» Using Attack Graphs to Design Systems
Sort
View
103 views 121 votes 15 years 5 months ago  DSN 2007»
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
201 views 122 votes 15 years 6 months ago  WOWMOM 2005»
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
131 views 119 votes 16 years 1 months ago  ICSE 2008»
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
205 views 103 votes 15 years 8 months ago  CHI 2010»
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
87 views 110 votes 15 years 7 months ago  INFOCOM 2007»
— Loss networks provide a powerful tool for the analysis and design of many communication and networking systems. It is well known that a large number of loss networks have produ...
166 views 131 votes 15 years 4 months ago  DAC 2010»
Online social networks are a growing internet phenomenon: they connect millions of individuals through sharing of common interests, political and religious views, careers, etc. So...
101 views 100 votes 15 years 5 months ago  HIPEAC 2009»
Abstract. Exposing more instruction-level parallelism in out-of-order superscalar processors requires increasing the number of dynamic in-flight instructions. However, large instru...
257 views 161 votes 14 years 7 months ago  ISSE 2011»
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
146 views 133 votes 15 years 6 months ago  SPATIALCOGNITION 2004»
Abstract. In this paper we apply a formal ontological framework in order to deconstruct two prominent approaches to navigation from cognitive robotics, the Spatial Semantic Hierarc...
157 views 97 votes 15 years 3 months ago  HOTDEP 2008»
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...