Sciweavers

601 search results - page 71 / 121
» Verifiable Network-Performance Measurements
Sort
View
CCS
2004
ACM
15 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
INFOCOM
2003
IEEE
15 years 3 months ago
The effect of layer-2 store-and-forward devices on per-hop capacity estimation
— Tools such as pathchar, clink, and pchar attempt to measure the capacity of every Layer-3 (L3) hop in a network path. These tools use the same underlying measurement methodolog...
Ravi Prasad, Constantinos Dovrolis, Bruce A. Mah
BMCBI
2008
144views more  BMCBI 2008»
14 years 10 months ago
Local conservation scores without a priori assumptions on neutral substitution rates
Background: Comparative genomics aims to detect signals of evolutionary conservation as an indicator of functional constraint. Surprisingly, results of the ENCODE project revealed...
Janis Dingel, Pavol Hanus, Niccolò Leonardi...
SIGSOFT
2004
ACM
15 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
CIE
2007
Springer
15 years 4 months ago
Strict Self-assembly of Discrete Sierpinski Triangles
Winfree (1998) showed that discrete Sierpinski triangles can self-assemble in the Tile Assembly Model. A striking molecular realization of this self-assembly, using DNA tiles a fe...
James I. Lathrop, Jack H. Lutz, Scott M. Summers