Sciweavers

132 search results - page 21 / 27
» Logic for Automated Mechanism Design - A Progress Report
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 4 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
14 years 20 days ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
OSDI
2002
ACM
14 years 7 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
DAC
2000
ACM
14 years 7 months ago
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization
In this paper, we propose a technique to implement communication protocols as hardware circuits using a model of concurrent EFSMs with multi-way synchronization. Since use of mult...
Hisaaki Katagiri, Keiichi Yasumoto, Akira Kitajima...
CHI
2009
ACM
14 years 7 months ago
Can machines call people?: user experience while answering telephone calls initiated by machine
Current state-of?the-art spoken dialog systems are aimed at handling telephone calls to automate incoming caller requests. In this paper we explore a scenario which is symmetric t...
Adam J. Sporka, Jakub Franc, Giuseppe Riccardi