Sciweavers

752 search results - page 58 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
158
Voted
AC
2005
Springer
15 years 3 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
139
Voted
KBSE
2008
IEEE
15 years 10 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
87
Voted
ACSAC
2004
IEEE
15 years 7 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
DIMVA
2007
15 years 4 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
131
Voted
WSC
1997
15 years 4 months ago
A Framework for Performance Analysis of Parallel Discrete Event Simulators
A framework for performance analysis of parallel discrete event simulators is presented. The centerpiece of this framework is a platform-independent Workload Specification Langua...
Vijay Balakrishnan, Peter Frey, Nael B. Abu-Ghazal...