Sciweavers

457 search results - page 31 / 92
» Construction of a Highly Dependable Operating System
Sort
View
OSDI
2004
ACM
14 years 8 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum
ACSAC
2004
IEEE
14 years 7 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
DFT
2008
IEEE
86views VLSI» more  DFT 2008»
14 years 2 months ago
Enhancing Silicon Debug via Periodic Monitoring
Scan-based debug methods give high observability of internal signals, however, they require halting the system to scan out responses from the circuit-under-debug (CUD). This is ti...
Joon-Sung Yang, Nur A. Touba
PLDI
2011
ACM
12 years 11 months ago
Data representation synthesis
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is both declarative lts in provably correct code. In our approach, abst...
Peter Hawkins, Alex Aiken, Kathleen Fisher, Martin...
STACS
2010
Springer
14 years 3 months ago
Intrinsic Universality in Self-Assembly
We show that the Tile Assembly Model exhibits a strong notion of universality where the goal is to give a single tile assembly system that simulates the behavior of any other tile...
David Doty, Jack H. Lutz, Matthew J. Patitz, Scott...