Sciweavers

350 search results - page 30 / 70
» Improving application security with data flow assertions
Sort
View
EUROSYS
2010
ACM
13 years 12 months ago
Locating cache performance bottlenecks using data profiling
Effective use of CPU data caches is critical to good performance, but poor cache use patterns are often hard to spot using existing execution profiling tools. Typical profilers at...
Aleksey Pesterev, Nickolai Zeldovich, Robert T. Mo...
ICN
2005
Springer
14 years 1 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 3 days ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
VIS
2007
IEEE
86views Visualization» more  VIS 2007»
14 years 9 months ago
Illustrative Deformation for Data Exploration
Abstract--Much of the visualization research has focused on improving the rendering quality and speed, and enhancing the perceptibility of features in the data. Recently, significa...
Carlos Correa, Deborah Silver, Min Chen
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
14 years 1 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...