Sciweavers

1028 search results - page 150 / 206
» Using Attack Graphs to Design Systems
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Two Variations to the mCESG Pollsterless E-Voting Scheme
— Over the past several years, the UK Government has piloted several new voting technologies during local authority elections. The mCESG pollsterless Remote Electronic Voting (RE...
Tim Storer, Ishbel Duncan
ESCIENCE
2005
IEEE
14 years 2 months ago
Distributed, Parallel Web Service Orchestration Using XSLT
GridXSLT is an implementation of the XSLT programming language designed for distributed web service orchestration. Based on the functional semantics of the language, it compiles p...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
INFOCOM
2006
IEEE
14 years 2 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
VLDB
2004
ACM
163views Database» more  VLDB 2004»
14 years 2 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
NDSS
2006
IEEE
14 years 2 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...