Sciweavers

392 search results - page 54 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
CCS
2008
ACM
14 years 19 days ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
CCS
2009
ACM
14 years 5 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
VLSID
2002
IEEE
174views VLSI» more  VLSID 2002»
14 years 11 months ago
Architecture Implementation Using the Machine Description Language LISA
The development of application specific instruction set processors comprises several design phases: architecture exploration, software tools design, system verification and design...
Oliver Schliebusch, Andreas Hoffmann, Achim Nohl, ...
PODS
2003
ACM
107views Database» more  PODS 2003»
14 years 10 months ago
E-services: a look behind the curtain
The emerging paradigm of electronic services promises to bring to distributed computation and services the flexibility that the web has brought to the sharing of documents. An und...
Richard Hull, Michael Benedikt, Vassilis Christoph...
EPEW
2010
Springer
13 years 10 months ago
Accurate Performance Estimation for Stochastic Marked Graphs by Bottleneck Regrowing
Abstract. The adequate system performance is usually a critical requirement to be checked during the verification phase of a system. Thus, accurately measuring the performance of c...
Ricardo J. Rodríguez, Jorge Júlvez