Sciweavers

1278 search results - page 224 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 2 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
OOPSLA
2001
Springer
14 years 1 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
SEMWEB
2007
Springer
14 years 3 months ago
An Ontology-based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
Clinical Practice Guidelines (CPGs) play an important role in improving the quality of care and patient outcomes. Although several machine-readable representations of practice guid...
Hai-Tao Zheng, Bo-Yeong Kang, Hong-Gee Kim
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 3 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
WIOPT
2010
IEEE
13 years 7 months ago
Optimal revocations in ephemeral networks: A game-theoretic framework
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...