Sciweavers

1821 search results - page 171 / 365
» Security-Aware Program Transformations
Sort
View
JLP
2007
98views more  JLP 2007»
13 years 9 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
TII
2010
155views Education» more  TII 2010»
13 years 3 months ago
Refactoring of Execution Control Charts in Basic Function Blocks of the IEC 61499 Standard
-This paper deals with refactoring of execution control charts of IEC 61499 basic function blocks as a means to improve the engineering support potential of the standard in develop...
Valeriy Vyatkin, Victor Dubinin
ASPLOS
2011
ACM
13 years 25 days ago
Dynamic knobs for responsive power-aware computing
We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static con...
Henry Hoffmann, Stelios Sidiroglou, Michael Carbin...
CSR
2011
Springer
13 years 22 days ago
Improving the Space-Bounded Version of Muchnik's Conditional Complexity Theorem via "Naive" Derandomization
Abstract. Many theorems about Kolmogorov complexity rely on existence of combinatorial objects with specific properties. Usually the probabilistic method gives such objects with b...
Daniil Musatov
PAM
2012
Springer
12 years 4 months ago
A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications
Network administrators are faced with the increasingly challenging task of monitoring their network’s health in real time, drawing upon diverse and voluminous measurement data fe...
Lukasz Golab, Theodore Johnson, Subhabrata Sen, Je...