Sciweavers

756 search results - page 135 / 152
» Modeling Computational Security in Long-Lived Systems
Sort
View
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 4 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
PADS
2006
ACM
15 years 10 months ago
SOAr-DSGrid: Service-Oriented Architecture for Distributed Simulation on the Grid
Simulation is a low cost alternative to experimentation on real-world physical systems. Grid technology enables coordinated use of and secure access to distributed computing resou...
Xinjun Chen, Wentong Cai, Stephen John Turner, Yon...
PASTE
2005
ACM
15 years 10 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
EUROSYS
2006
ACM
16 years 1 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
ANCS
2007
ACM
15 years 8 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos