Sciweavers

2639 search results - page 503 / 528
» Improving Web Design Methods with Architecture Modeling
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
IMC
2010
ACM
13 years 5 months ago
Resolving IP aliases with prespecified timestamps
Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP address...
Justine Sherry, Ethan Katz-Bassett, Mary Pimenova,...
MOBIHOC
2012
ACM
11 years 10 months ago
Spatial spectrum access game: nash equilibria and distributed learning
A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mecha...
Xu Chen, Jianwei Huang
BMCBI
2010
93views more  BMCBI 2010»
13 years 7 months ago
Hybridization thermodynamics of NimbleGen Microarrays
Background: While microarrays are the predominant method for gene expression profiling, probe signal variation is still an area of active research. Probe signal is sequence depend...
Ulrike Mückstein, Germán G. Leparc, Al...
APLAS
2010
ACM
13 years 8 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...