Sciweavers

5326 search results - page 19 / 1066
» On what we can ensure
Sort
View
AINA
2007
IEEE
14 years 4 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 4 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
ICPADS
2006
IEEE
14 years 3 months ago
Ensuring Fairness Among Participating Clusters During Multi-site Parallel Job Scheduling
Multi-cluster schedulers can dramatically improve average job turn-around time performance by making use of fragmented node resources available throughout the grid. By carefully m...
William M. Jones, Walter B. Ligon III
WSC
2000
13 years 11 months ago
Ensuring the successful adoption of discrete event simulation in a manufacturing environment
Discrete event simulation has long been recognized as a valuable tool for manufacturers, but converting the recognition of value into an embrace of the technology can be a challen...
J. Michael Knoll, Joseph A. Heim
FASE
2009
Springer
14 years 4 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel