Sciweavers

3910 search results - page 764 / 782
» Analyzing Cross-Connected Networks
Sort
View
CCS
2008
ACM
13 years 12 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
ISARCS
2010
240views Hardware» more  ISARCS 2010»
13 years 12 months ago
Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements
Voting is a critical component of any democratic process; and electronic voting systems should be developed following best practices for critical system development. E-voting has i...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
ESOP
2008
Springer
13 years 11 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
IMC
2007
ACM
13 years 11 months ago
Understanding wifi-based connectivity from moving vehicles
– Using measurements from VanLAN, a modest-size testbed that we have deployed, we analyze the fundamental characteristics of WiFi-based connectivity between basestations and vehi...
Ratul Mahajan, John Zahorjan, Brian Zill
APVIS
2010
13 years 11 months ago
Visualizing field-measured seismic data
This paper presents visualization of field-measured, time-varying multidimensional earthquake accelerograph readings. Direct volume rendering is used to depict the space-time rela...
Tung-Ju Hsieh, Cheng-Kai Chen, Kwan-Liu Ma