Sciweavers

1028 search results - page 189 / 206
» Using Attack Graphs to Design Systems
Sort
View
CCS
2001
ACM
14 years 1 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
BMCBI
2008
226views more  BMCBI 2008»
13 years 8 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
WCRE
2000
IEEE
14 years 1 months ago
A Structured Demonstration of Five Program Comprehension Tools: Lessons Learnt
The purpose of this panel is to report on a structured demonstration for comparing program comprehension tools. Five program comprehension tool designers applied their tools to a ...
Susan Elliott Sim, Margaret-Anne D. Storey, Andrea...
SIGUCCS
2000
ACM
14 years 1 months ago
Knowledgebase Integration with a 24-hour Help Desk
The University of Pittsburgh's Computing Services and Systems Development organization is focused on the needs of the faculty and student population, totaling nearly 40,000 u...
Jay Graham, Brian K. Hart
ICPADS
1994
IEEE
14 years 22 days ago
Stochastic Modeling of Scaled Parallel Programs
Testingthe performance scalabilityof parallelprograms can be a time consuming task, involving many performance runs for different computer configurations, processor numbers, and p...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...