Sciweavers

3235 search results - page 622 / 647
» Partial Redundant Modeling
Sort
View
MICRO
2005
IEEE
105views Hardware» more  MICRO 2005»
14 years 3 months ago
Incremental Commit Groups for Non-Atomic Trace Processing
We introduce techniques to support efficient non-atomic execution of very long traces on a new binary translation based, x86-64 compatible VLIW microprocessor. Incrementally comm...
Matt T. Yourst, Kanad Ghose
AOSD
2005
ACM
14 years 3 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
SAC
2005
ACM
14 years 3 months ago
A case study on building COTS-based system using aspect-oriented programming
More and more software projects are using COTS (Commercialoff-the-shelf) components. Using COTS components brings both advantages and risks. To manage some risks in using COTS com...
Axel Anders Kvale, Jingyue Li, Reidar Conradi
CCS
2005
ACM
14 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay