Sciweavers

191 search results - page 25 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
SPIN
2010
Springer
13 years 7 months ago
Experimental Comparison of Concolic and Random Testing for Java Card Applets
Concolic testing is a method for test input generation where a given program is executed both concretely and symbolically at the same time. This paper introduces the LIME Concolic ...
Kari Kähkönen, Roland Kindermann, Keijo ...
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 2 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
HPCS
2005
IEEE
14 years 2 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
AP2PC
2004
Springer
14 years 2 months ago
ACP2P: Agent Community Based Peer-to-Peer Information Retrieval
This paper proposes an agent community based information retrieval method, which uses agent communities to manage and look up information related to users. An agent works as a dele...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...
BMCBI
2007
125views more  BMCBI 2007»
13 years 8 months ago
Bayesian meta-analysis models for microarray data: a comparative study
Background: With the growing abundance of microarray data, statistical methods are increasingly needed to integrate results across studies. Two common approaches for meta-analysis...
Erin M. Conlon, Joon J. Song, Anna Liu