Sciweavers

4007 search results - page 610 / 802
» Computation with imprecise probabilities
Sort
View
ICALP
2007
Springer
15 years 10 months ago
Checking and Spot-Checking the Correctness of Priority Queues
We revisit the problem of memory checking considered by Blum et al. [3]. In this model, a checker monitors the behavior of a data structure residing in unreliable memory given an a...
Matthew Chu, Sampath Kannan, Andrew McGregor
ICN
2007
Springer
15 years 10 months ago
Ring-Based Virtual Private Network Supporting a Large Number of VPNs
— In this paper, we propose a simple but effective VPN mechanism called RING-VPN (Ring-based Virtual Private Network) that realizes a high scalability in terms of the number of V...
Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhi...
IH
2007
Springer
15 years 10 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ISPEC
2007
Springer
15 years 10 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
MFCS
2007
Springer
15 years 10 months ago
On Approximation of Bookmark Assignments
Consider a rooted directed acyclic graph G = (V, E) with root r, representing a collection V of web pages connected via a set E of hyperlinks. Each node v is associated with the pr...
Yuichi Asahiro, Eiji Miyano, Toshihide Murata, Hir...