Sciweavers

276 search results - page 47 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
SBACPAD
2003
IEEE
121views Hardware» more  SBACPAD 2003»
14 years 19 days ago
Optimizing Packet Capture on Symmetric Multiprocessing Machines
Traffic monitoring and analysis based on general purpose systems with high speed interfaces, such as Gigabit Ethernet and 10 Gigabit Ethernet, requires carefully designed software...
Gianluca Varenni, Mario Baldi, Loris Degioanni, Fu...
IUI
2010
ACM
14 years 4 months ago
Towards maximizing the accuracy of human-labeled sensor data
We present two studies that evaluate the accuracy of human responses to an intelligent agent’s data classification questions. Prior work has shown that agents can elicit accurat...
Stephanie Rosenthal, Anind K. Dey
JTAER
2010
121views more  JTAER 2010»
13 years 5 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
SC
2005
ACM
14 years 27 days ago
Fault Tolerance Techniques for the Merrimac Streaming Supercomputer
As device scales shrink, higher transistor counts are available while soft-errors, even in logic, become a major concern. A new class of architectures, such as Merrimac and the IB...
Mattan Erez, Nuwan Jayasena, Timothy J. Knight, Wi...