Sciweavers

790 search results - page 25 / 158
» Designated Confirmer Signatures
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 2 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
MICRO
2007
IEEE
137views Hardware» more  MICRO 2007»
14 years 2 months ago
Implementing Signatures for Transactional Memory
Transactional Memory (TM) systems must track the read and write sets—items read and written during a transaction—to detect conflicts among concurrent transactions. Several TM...
Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeya...
JAMIA
2011
94views more  JAMIA 2011»
12 years 10 months ago
Protein-network modeling of prostate cancer gene signatures reveals essential pathways in disease recurrence
Objective Uncovering the dominant molecular deregulation among the multitude of pathways implicated in aggressive prostate cancer is essential to intelligently developing targeted...
James L. Chen, Jianrong Li, Walter M. Stadler, Yve...
ICCD
2006
IEEE
133views Hardware» more  ICCD 2006»
14 years 4 months ago
Patching Processor Design Errors
— Microprocessors can have design errors that escape the test and validation process. The cost to rectify these errors after shipping the processors can be very expensive as it m...
Satish Narayanasamy, Bruce Carneal, Brad Calder