Sciweavers

323 search results - page 41 / 65
» Verify Your Runs
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Model Checking An Entire Linux Distribution for Security Violations
Software model checking has become a popular tool for verifying programs’ behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...
INFOCOM
2005
IEEE
14 years 3 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
WORDS
2005
IEEE
14 years 3 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
SMA
2005
ACM
168views Solid Modeling» more  SMA 2005»
14 years 3 months ago
Layered tetrahedral meshing of thin-walled solids for plastic injection molding FEM
This paper describes a method for creating a well-shaped, layered tetrahedral mesh of a thin-walled solid by adapting the surface triangle sizes to the estimated wall thickness. T...
Soji Yamakawa, Charles Shaw, Kenji Shimada
WOWMOM
2005
ACM
118views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Fast IP Handoff Support for VoIP and Multimedia Applications in 802.11 WLANs
Wireless LANs (WLANs) have edged into numerous mobile and wireless users’ daily experience worldwide as a mainstream connectivity solution for a broad range of applications. Eve...
Ioanna Samprakou, Christos Bouras, Theodore Karoub...