Sciweavers

2178 search results - page 378 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2009
ACM
13 years 11 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
SIGCOMM
2012
ACM
11 years 10 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
DAC
2008
ACM
14 years 8 months ago
Concurrent topology and routing optimization in automotive network integration
In this paper, a novel automatic approach for the concurrent topology and routing optimization that achieves a high quality network layout is proposed. This optimization is based ...
Bardo Lang, Christian Haubelt, Jürgen Teich, ...
CHI
2009
ACM
14 years 8 months ago
Attaching UI enhancements to websites with end users
We present reform, a system that envisions roles for both programmers and end users in enhancing existing websites to support new goals. First, programmers author a traditional ma...
Michael Toomim, Steven M. Drucker, Mira Dontcheva,...
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
14 years 8 months ago
Supporting entity search: a large-scale prototype search engine
As the Web has evolved into a data-rich repository, with the standard "page view," current search engines are increasingly inadequate. While we often search for various ...
Tao Cheng, Xifeng Yan, Kevin Chen-Chuan Chang