Sciweavers

1795 search results - page 246 / 359
» Security Models and Information Flow
Sort
View
WSC
2008
14 years 14 days ago
Creating and using non-kinetic effects: Training joint forces for asymmetric operations
US military forces now face asymmetric military operations. Management of relationships with civilians is often crucial to success. Local population groups can provide critical in...
Hugh Henry, Robert G. Chamberlain
CCS
2010
ACM
13 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
PASTE
2010
ACM
14 years 3 months ago
Learning universal probabilistic models for fault localization
Recently there has been significant interest in employing probabilistic techniques for fault localization. Using dynamic dependence information for multiple passing runs, learnin...
Min Feng, Rajiv Gupta
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
14 years 10 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...
CIKM
2009
Springer
14 years 4 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...