Sciweavers

5722 search results - page 1053 / 1145
» Security Function Interactions
Sort
View
ICST
2009
IEEE
15 years 9 months ago
Unit Testing Non-functional Concerns of Component-based Distributed Systems
Unit testing component-based distributed systems traditionally involved testing functional concerns of the application logic throughout the development lifecycle. In contrast, tes...
James H. Hill, Hamilton A. Turner, James R. Edmond...
AMMA
2009
Springer
15 years 9 months ago
Turing Trade: A Hybrid of a Turing Test and a Prediction Market
Abstract. We present Turing Trade, a web-based game that is a hybrid of a Turing test and a prediction market. In this game, there is a mystery conversation partner, the “target,...
Joseph Farfel, Vincent Conitzer
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
158
Voted
ACMSE
2009
ACM
15 years 9 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
SIGCOMM
2009
ACM
15 years 9 months ago
Router primitives for programmable active measurement
Active probe-based measurements are the foundation for understanding important network path properties such as SLA compliance and available bandwidth. Well-known challenges in act...
Joel Sommers, Paul Barford, Mark Crovella
« Prev « First page 1053 / 1145 Last » Next »