Sciweavers

3104 search results - page 295 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 8 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
145
Voted
BMCBI
2008
122views more  BMCBI 2008»
15 years 5 months ago
OpenDMAP: An open source, ontology-driven concept analysis engine, with applications to capturing knowledge regarding protein tr
Background: Information extraction (IE) efforts are widely acknowledged to be important in harnessing the rapid advance of biomedical knowledge, particularly in areas where import...
Lawrence Hunter, Zhiyong Lu, James Firby, William ...
ICSE
2009
IEEE-ACM
16 years 5 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
113
Voted
WEBI
2005
Springer
15 years 10 months ago
Weighted Link Analysis for Logo and Trademark Image Retrieval on the Web
Image retrieval on the Web requires that important (authoritative) images satisfying the query selection criteria are assigned higher ranking over other relevant images. PicASHOW ...
Epimenidis Voutsakis, Euripides G. M. Petrakis, Ev...
ECOOP
2007
Springer
15 years 11 months ago
Aspect-Based Introspection and Change Analysis for Evolving Programs
— As new versions of software are developed bugs inevitably arise either due to regression or new functionality. Challenges arise in discovering, managing, and testing the impact...
Kevin J. Hoffman, Murali Krishna Ramanathan, Patri...