Sciweavers

1833 search results - page 315 / 367
» Mechanized Verification with Sharing
Sort
View
SKG
2006
IEEE
15 years 10 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
NSPW
2006
ACM
15 years 10 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
GPS scheduling: selection of optimal weights and comparison with strict priorities
We consider a system with two service classes with heterogeneous traffic characteristics and Quality-of-Service requirements. The available bandwidth is shared between the two tra...
Pascal Lieshout, Michel Mandjes, Sem C. Borst
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
15 years 10 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
CSB
2005
IEEE
168views Bioinformatics» more  CSB 2005»
15 years 10 months ago
cis-Regulatory Element Prediction in Mammalian Genomes
The identification of cis-regulatory elements and modules is an important step in understanding the regulation of genes. We have developed a pipeline capable of running multiple m...
Asim S. Siddiqui, Gordon Robertson, Misha Bilenky,...