Sciweavers

519 search results - page 76 / 104
» Control flow obfuscation with information flow tracking
Sort
View
IPPS
1998
IEEE
14 years 1 months ago
A Generalized Framework for Global Communication Optimization
In distributed-memory message-passing architectures reducing communication cost is extremely important. In this paper, we present a technique to optimize communication globally. O...
Mahmut T. Kandemir, Prithviraj Banerjee, Alok N. C...
COOPIS
2004
IEEE
14 years 16 days ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
CAISE
2008
Springer
13 years 10 months ago
A Work Allocation Language with Soft Constraints
Today's business process orchestration languages such as WS-BPEL and BPML have high-level constructs for specifying flow of control and data, but facilities for allocating ta...
Christian Stefansen, Sriram K. Rajamani, Parameswa...
CCS
2010
ACM
13 years 9 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
MANSCI
2006
94views more  MANSCI 2006»
13 years 8 months ago
Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
Most successful online marketplaces today are owned and operated by firms that are themselves traders in the marketplace. This raises significant concerns about the fairness of th...
Joakim Kalvenes, Amit Basu