Sciweavers

877 search results - page 151 / 176
» Model Based Development of Safety-Critical Systems Using Tem...
Sort
View
CGO
2005
IEEE
14 years 1 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
SMA
1999
ACM
106views Solid Modeling» more  SMA 1999»
14 years 1 hour ago
Resolving non-uniqueness in design feature histories
Nearly all major commercial computer-aided design systems have adopted a feature-based design approach to solid modeling. Models are created via a sequence of operations which app...
Vincent A. Cicirello, William C. Regli
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 9 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
INFOSCALE
2006
ACM
14 years 1 months ago
Evaluation of network impact of content distribution mechanisms
Efficient large-scale content distribution continues to be an important problem, due to the increasing popularity of multimedia content and wide-spread use of peer-to-peer file ...
Shibsankar Das, Jussi Kangasharju
PLDI
2003
ACM
14 years 28 days ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang