Sciweavers

4340 search results - page 189 / 868
» Designing for change
Sort
View
CMS
2006
15 years 5 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 11 months ago
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
Innocentia Dlamini, Martin Olivier, Sihle Sibiya
ICCAD
2004
IEEE
100views Hardware» more  ICCAD 2004»
16 years 1 months ago
A chip-level electrostatic discharge simulation strategy
This paper presents a chip-level charged device model (CDM) electrostatic discharge (ESD) simulation method. The chip-level simulation is formulated as a DC analysis problem. A ne...
Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, S...
SGAI
2004
Springer
15 years 9 months ago
Managing ontology versions with a distributed blackboard architecture
Ontology versioning deals with the management of ontology changes, including the evaluation of the consequences arising from these changes. We describe a distributed, “pluggable...
Ernesto Compatangelo, Wamberto Vasconcelos, Bruce ...
COMPSAC
2002
IEEE
15 years 9 months ago
The Architecture of a Dynamically Updatable, Component-Based System
On-the-fly replacement of software may require simultanous distributed updates of components. If an update changes some interfaces or protocols, the update must be performed in a...
Robert Pawel Bialek