Sciweavers

256 search results - page 13 / 52
» Computing by Observing Bio-systems: The Case of Sticker Syst...
Sort
View
CISS
2010
IEEE
13 years 2 days ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 11 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
BIRTHDAY
2010
Springer
13 years 6 months ago
Tracking Evidence
In this case study we describe an approach to a general logical framework for tracking evidence within epistemic contexts. We consider as basic an example which features two justi...
Sergei N. Artëmov
FOSSACS
2009
Springer
14 years 3 months ago
Reactive Systems, Barbed Semantics, and the Mobile Ambients
Reactive systems, proposed by Leifer and Milner, represent a meta-framework aimed at deriving behavioral congruences for those specification formalisms whose operational semantics...
Filippo Bonchi, Fabio Gadducci, Giacoma Valentina ...
IPPS
2007
IEEE
14 years 2 months ago
Detecting Runtime Environment Interference with Parallel Application Behavior
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performa...
Rashawn L. Knapp, Karen L. Karavanic, Douglas M. P...