Sciweavers

357 search results - page 70 / 72
» Code security analysis with assertions
Sort
View
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 10 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
SOSP
2007
ACM
14 years 6 months ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
ASPLOS
2012
ACM
12 years 5 months ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel
WWW
2004
ACM
14 years 10 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 9 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri