Sciweavers

71 search results - page 6 / 15
» A Step Towards Practical Steganography Systems
Sort
View
CC
2001
Springer
13 years 11 months ago
Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries
Large programs are typically built from separate modules. Traditional whole-program analysis cannot be used in the context of such modular development. In this paper we consider an...
Atanas Rountev, Barbara G. Ryder
ECRTS
2003
IEEE
14 years 28 days ago
Using Supertasks to Improve Processor Utilization in Multiprocessor Real-Time Systems
We revisit the problem of supertasking in Pfair-scheduled multiprocessor systems. In this approach, a set of tasks, called component tasks, is assigned to a server task, called a ...
Philip Holman, James H. Anderson
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
14 years 9 months ago
Proof Sketches: Verifiable In-Network Aggregation
Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In...
Minos N. Garofalakis, Joseph M. Hellerstein, Petro...
CCS
2003
ACM
14 years 26 days ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
MSS
2007
IEEE
111views Hardware» more  MSS 2007»
14 years 1 months ago
Enabling database-aware storage with OSD
The ANSI Object-based Storage Device (OSD) standard is a major step toward enabling explicit application­ awareness in storage systems behind a standard, fully­ interoperable in...
Aravindan Raghuveer, Steven W. Schlosser, Sami Ire...