Sciweavers

2412 search results - page 292 / 483
» Which Problems Have Strongly Exponential Complexity
Sort
View
146
Voted
ACSAC
2009
IEEE
15 years 10 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
127
Voted
ECUMN
2007
Springer
15 years 9 months ago
Path Computation for Incoming Interface Multipath Routing
— Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
130
Voted
ESORICS
2005
Springer
15 years 9 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
117
Voted
SOUPS
2010
ACM
15 years 7 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
141
Voted
BMCBI
2010
124views more  BMCBI 2010»
15 years 3 months ago
A factor model to analyze heterogeneity in gene expression
Background: Microarray technology allows the simultaneous analysis of thousands of genes within a single experiment. Significance analyses of transcriptomic data ignore the gene d...
Yuna Blum, Guillaume Le Mignon, Sandrine Lagarrigu...