Sciweavers

1028 search results - page 94 / 103
» Using Attack Graphs to Design Systems
Sort
View
102 views 80 votes 15 years 5 months ago  IPPS 2000»
Abstract. Rent's rule and related concepts of connectivity such as dimensionality, line-length distributions, and separators have found great use in fundamental studies of di ...
130 views 110 votes 16 years 2 months ago  DAC 1998»
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
221 views 138 votes 14 years 27 days ago  IACR 2011»
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
285 views 160 votes 15 years 10 months ago  PPOPP 2010»
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
142 views 99 votes 15 years 10 months ago  TLDI 2009»
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
176 views 104 votes 15 years 7 months ago  CIKM 2009»
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
110 views 93 votes 15 years 1 months ago  CORR 2007»
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
106 views 96 votes 15 years 7 months ago  PDCAT 2007»
We present the architecture of nreduce, a distributed virtual machine which uses parallel graph reduction to run programs across a set of computers. It executes code written in a ...
107 views 97 votes 15 years 10 months ago  ICCAD 2007»
— Computing counterexamples is a crucial task for error diagnosis and debugging of sequential systems. If an implementation does not fulfill its specification, counterexamples ...
111 views 103 votes 15 years 6 months ago  SLIP 2003»
In the past, a priori interconnect prediction, based on Rent’s rule, has been applied mainly for technology evaluation and roadmap applications. These applications do not requir...