Sciweavers

448 search results - page 81 / 90
» Playing With Population Protocols
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 20 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
14 years 4 days ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
SRDS
2010
IEEE
13 years 6 months ago
P-Store: Genuine Partial Replication in Wide Area Networks
Partial replication is a way to increase the scalability of replicated systems since updates only need to be applied to a subset of the system's sites, thus allowing replicas...
Nicolas Schiper, Pierre Sutra, Fernando Pedone
BMCBI
2011
13 years 2 months ago
SAQC: SNP array quality control
Background: Genome-wide single-nucleotide polymorphism (SNP) arrays containing hundreds of thousands of SNPs from the human genome have proven useful for studying important human ...
Hsin-Chou Yang, Hsin-Chi Lin, Meijyh Kang, Chun-Ho...
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
14 years 8 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...