Sciweavers

1028 search results - page 97 / 103
» Using Attack Graphs to Design Systems
Sort
View
116 views 114 votes 15 years 1 months ago  CORR 2006»
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
167 views 91 votes 15 years 2 months ago  GECCO 2008»
We attack the problem of game balancing by using a coevolutionary algorithm to explore the space of possible game strategies and counter strategies. We define balanced games as g...
240 views 268 votes 15 years 6 months ago  INFOCOM 2005»
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
138 views 138 votes 15 years 5 months ago  ECBS 1999»
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
136 views 151 votes 15 years 5 months ago  CANS 2006»
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
123 views 93 votes 15 years 6 months ago  PODC 2003»
As the Internet grows in size, it becomes crucial to understand how the speeds of links in the network must improve in order to sustain the pressure of new end-nodes being added e...
106 views 126 votes 15 years 2 months ago  GD 2008»
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
146 views 124 votes 15 years 1 months ago  KES 2006»
In this paper, in order to reduce the explosive increase of the search space as the input dimension grows, we present a new representation method for the structure of fuzzy rules, ...
141 views 137 votes 15 years 5 months ago  ICWE 2009»
The user observed latency of retrieving Web documents is one of limiting factors while using the Internet as an information data source. Prefetching became important technique ...
185 views 135 votes 14 years 1 months ago  CIKM 2011»
A fundamental problem related to RDF query processing is selectivity estimation, which is crucial to query optimization for determining a join order of RDF triple patterns. In thi...