Sciweavers

318 search results - page 41 / 64
» How to Leak a Secret
Sort
View
WPES
2003
ACM
14 years 23 days ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
SC
2000
ACM
13 years 12 months ago
Is Data Distribution Necessary in OpenMP?
This paper investigates the performance implications of data placement in OpenMP programs running on modern ccNUMA multiprocessors. Data locality and minimization of the rate of r...
Dimitrios S. Nikolopoulos, Theodore S. Papatheodor...
CSFW
1999
IEEE
13 years 12 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
ICCBR
1999
Springer
13 years 11 months ago
When Experience Is Wrong: Examining CBR for Changing Tasks and Environments
Case-based problem-solving systems reason and learn from experiences, building up case libraries of problems and solutions to guide future reasoning. The expected bene ts of this l...
David B. Leake, David C. Wilson
EWCBR
2000
Springer
13 years 11 months ago
Remembering Why to Remember: Performance-Guided Case-Base Maintenance
An important focus of recent CBR research is on how to develop strategies for achieving compact, competent case-bases, as a way to improve the performance of CBR systems. However, ...
David B. Leake, David C. Wilson