Sciweavers

419 search results - page 58 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 1 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
BMCBI
2005
132views more  BMCBI 2005»
13 years 7 months ago
CLPM: A Cross-Linked Peptide Mapping Algorithm for Mass Spectrometric Analysis
Background: Protein-protein, protein-DNA and protein-RNA interactions are of central importance in biological systems. Quadrapole Time-of-flight (Q-TOF) mass spectrometry is a sen...
Yong Tang, Yingfeng Chen, Cheryl F. Lichti, Roger ...
TDSC
2010
119views more  TDSC 2010»
13 years 2 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
MICRO
2009
IEEE
222views Hardware» more  MICRO 2009»
14 years 2 months ago
Qilin: exploiting parallelism on heterogeneous multiprocessors with adaptive mapping
Heterogeneous multiprocessors are growingly important in the multi-core era due to their potential for high performance and energy efficiency. In order for software to fully real...
Chi-Keung Luk, Sunpyo Hong, Hyesoon Kim
DAC
2004
ACM
14 years 8 months ago
Virtual memory window for application-specific reconfigurable coprocessors
Reconfigurable Systems-on-Chip (SoCs) on the market consist of full-fledged processors and large Field-Programmable Gate-Arrays (FPGAs). The latter can be used to implement the sy...
Miljan Vuletic, Laura Pozzi, Paolo Ienne