Sciweavers

1028 search results - page 93 / 103
» Using Attack Graphs to Design Systems
Sort
View
166 views 131 votes 15 years 4 months ago  DAC 2010»
Online social networks are a growing internet phenomenon: they connect millions of individuals through sharing of common interests, political and religious views, careers, etc. So...
101 views 100 votes 15 years 5 months ago  HIPEAC 2009»
Abstract. Exposing more instruction-level parallelism in out-of-order superscalar processors requires increasing the number of dynamic in-flight instructions. However, large instru...
257 views 161 votes 14 years 7 months ago  ISSE 2011»
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
146 views 133 votes 15 years 6 months ago  SPATIALCOGNITION 2004»
Abstract. In this paper we apply a formal ontological framework in order to deconstruct two prominent approaches to navigation from cognitive robotics, the Spatial Semantic Hierarc...
157 views 97 votes 15 years 3 months ago  HOTDEP 2008»
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
102 views 80 votes 15 years 5 months ago  IPPS 2000»
Abstract. Rent's rule and related concepts of connectivity such as dimensionality, line-length distributions, and separators have found great use in fundamental studies of di ...
130 views 110 votes 16 years 2 months ago  DAC 1998»
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
221 views 138 votes 14 years 27 days ago  IACR 2011»
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
285 views 160 votes 15 years 10 months ago  PPOPP 2010»
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
142 views 99 votes 15 years 10 months ago  TLDI 2009»
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...