Sciweavers

1816 search results - page 178 / 364
» Trace oblivious computation
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
Scalable dynamic information flow tracking and its applications
We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (so...
Rajiv Gupta, Neelam Gupta, Xiangyu Zhang, Dennis J...
SIBGRAPI
2008
IEEE
14 years 3 months ago
Using Multi-agent Systems for Sampling and Rendering Implicit Surfaces
In this paper a Multi-Agent System for Sampling and Rendering Implicit Surfaces is presented (MASSRIS). Previous approaches to pen-and-ink style renderings of implicit surfaces we...
Pauline Jepp, Jörg Denzinger, Brian Wyvill, M...
AINA
2007
IEEE
14 years 3 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
CCGRID
2006
IEEE
14 years 3 months ago
SAHA: A Scheduling Algorithm for Security-Sensitive Jobs on Data Grids
Security-sensitive applications that access and generate large data sets are emerging in various areas such as bioinformatics and high energy physics. Data grids provide data-inte...
Tao Xie 0004, Xiao Qin
ICDCSW
2006
IEEE
14 years 3 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy