Sciweavers

892 search results - page 52 / 179
» Risks of rapid application development
Sort
View
SADFE
2009
IEEE
14 years 4 months ago
Automating Disk Forensic Processing with SleuthKit, XML and Python
We have developed a program called fiwalk which produces detailed XML describing all of the partitions and files on a hard drive or disk image, as well as any extractable metadat...
Simson L. Garfinkel
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 11 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 10 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
IPPS
2006
IEEE
14 years 4 months ago
Dynamic performance prediction of an adaptive mesh application
While it is possible to accurately predict the execution time of a given iteration of an adaptive application, it is not generally possible to predict the data-dependent adaptive ...
Mark M. Mathis, Darren J. Kerbyson
ISSS
1996
IEEE
102views Hardware» more  ISSS 1996»
14 years 2 months ago
Throughput Optimization in Disk-Based Real-Time Application Specific Systems
Traditionally, application specific computations have been focusing on numerically intensive data manipulation. Modern communications and DSP applications, such as WWW, interactiv...
Stephen Docy, Inki Hong, Miodrag Potkonjak