Sciweavers

1028 search results - page 119 / 206
» Using Attack Graphs to Design Systems
Sort
View
CC
2004
Springer
14 years 3 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
CDC
2009
IEEE
130views Control Systems» more  CDC 2009»
14 years 2 months ago
Spectral analysis of virus spreading in random geometric networks
— In this paper, we study the dynamics of a viral spreading process in random geometric graphs (RGG). The spreading of the viral process we consider in this paper is closely rela...
Victor M. Preciado, Ali Jadbabaie
SOFTVIS
2010
ACM
13 years 8 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
IEEESP
2007
98views more  IEEESP 2007»
13 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 3 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...