Sciweavers

1770 search results - page 125 / 354
» Writing requirements in computer security
Sort
View
WORM
2003
13 years 11 months ago
Access for sale: a new class of worm
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...
Stuart E. Schechter, Michael D. Smith
SOUPS
2009
ACM
14 years 4 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
PPOPP
2003
ACM
14 years 3 months ago
Exploiting high-level coherence information to optimize distributed shared state
InterWeave is a distributed middleware system that supports the sharing of strongly typed, pointer-rich data structures across a wide variety of hardware architectures, operating ...
DeQing Chen, Chunqiang Tang, Brandon Sanders, Sand...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
13 years 10 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
CSDA
2008
147views more  CSDA 2008»
13 years 10 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach