Sciweavers

355 search results - page 48 / 71
» Security Test Generation Using Threat Trees
Sort
View
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
13 years 9 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
INFOCOM
2009
IEEE
14 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
ESORICS
2011
Springer
12 years 9 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...
OOPSLA
2010
Springer
13 years 7 months ago
Towards a tool-based development methodology for sense/compute/control applications
This poster presents a design language and a tool suite covering the development life-cycle of a Sense/Compute/Control (SCC) application. This language makes it possible to define...
Damien Cassou, Julien Bruneau, Julien Mercadal, Qu...
SIGCSE
2008
ACM
169views Education» more  SIGCSE 2008»
13 years 9 months ago
APOGEE: automated project grading and instant feedback system for web based computing
Providing consistent, instant, and detailed feedback to students has been a big challenge in teaching Web based computing, given the complexity of project assignments and the comp...
Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, ...