Sciweavers

180 search results - page 25 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
HICSS
1996
IEEE
86views Biometrics» more  HICSS 1996»
13 years 11 months ago
Towards a Thread-Based Parallel Direct Execution Simulator
Parallel direct execution simulation is an important tool for performance and scalability analysis of large message passing parallel programs executing on top of a virtual compute...
Phillip M. Dickens, Matthew Haines, Piyush Mehrotr...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ELPUB
2006
ACM
14 years 1 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier
CSFW
2005
IEEE
14 years 1 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
JKM
2007
88views more  JKM 2007»
13 years 7 months ago
The concept of knowledge in KM: a dimensional model
Purpose: To sharpen the concepts of tacit, implicit and explicit knowledge by linking them to findings from cognitive psychology and memory science and thus finding a possibility ...
Bertolt Meyer, Kozo Sugiyama