Sciweavers

781 search results - page 103 / 157
» An Integrated Model for Hybrid Securities
Sort
View
WSC
2004
13 years 10 months ago
Operational Analysis Framework for Emergency Operations Center Preparedness Training
As the U.S. Department of Homeland Security works to create an integrated emergency response system, it is evident that computer-based solutions can support this process. Individu...
Eytan Pollak, Mark Falash, Lorie Ingraham, Vivian ...
CCS
2006
ACM
14 years 13 days ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
CN
2007
116views more  CN 2007»
13 years 8 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
TVLSI
2010
13 years 3 months ago
Discrete Buffer and Wire Sizing for Link-Based Non-Tree Clock Networks
Clock network is a vulnerable victim of variations as well as a main power consumer in many integrated circuits. Recently, link-based non-tree clock network attracts people's...
Rupak Samanta, Jiang Hu, Peng Li