Sciweavers

1131 search results - page 81 / 227
» Performance analysis of BSTs in system software
Sort
View
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 10 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
125
Voted
RE
2007
Springer
15 years 10 months ago
Tracing and Validating Goal Aspects
Aspects promote a clear separation of concerns so that tangled and scattered concerns are modularized throughout software development. We propose a framework to trace aspects iden...
Yijun Yu, Nan Niu, Bruno González-Baixauli,...
162
Voted
ACSAC
2006
IEEE
15 years 10 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
139
Voted
CCS
2011
ACM
14 years 3 months ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman
PLDI
2006
ACM
15 years 10 months ago
Termination proofs for systems code
Program termination is central to the process of ensuring that systems code can always react. We describe a new program termination prover that performs a path-sensitive and conte...
Byron Cook, Andreas Podelski, Andrey Rybalchenko