Sciweavers

180 search results - page 31 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
CP
2009
Springer
14 years 8 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang
CIKM
2005
Springer
14 years 1 months ago
Selectivity-based partitioning: a divide-and-union paradigm for effective query optimization
Modern query optimizers select an efficient join ordering for a physical execution plan based essentially on the average join selectivity factors among the referenced tables. In ...
Neoklis Polyzotis
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
12 years 10 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
INFOCOM
2008
IEEE
14 years 1 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 8 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...