-
1
-
-
0030642559
-
Superweb: Towards a global web-based parallel computing infrastructure
-
Geneva, Switzerland, April
-
A.D. Alexandrov, M. Ibel, K.E. Schauser, and C.J. Scheiman, “SuperWeb: Towards a Global Web-Based Parallel Computing Infrastructure”, 11th IEEE International Parallel Processing Symposium, Geneva, Switzerland, April 1997.
-
(1997)
11th IEEE International Parallel Processing Symposium
-
-
Alexandrov, A.D.1
Ibel, M.2
Schauser, K.E.3
Scheiman, C.J.4
-
2
-
-
0040196160
-
Solving large quadratic assignment problems on computational grids
-
Atlanta, Georgia, August
-
K. Anstreicher, N. Brixius, J.-P. Goux, and J. Linderoth, “Solving Large Quadratic Assignment Problems on Computational Grids”, 17th International Symposium on Mathematical Programming, Atlanta, Georgia, August 2000.
-
(2000)
17th International Symposium on Mathematical Programming
-
-
Anstreicher, K.1
Brixius, N.2
Goux, J.-P.3
Linderoth, J.4
-
3
-
-
1142294722
-
Standard ML of New Jersey
-
Passau, Germany, August 1991. Also J. Maluszynski and M. Wirsing, eds., Programming Language Implementation and Logic Programming, Lecture Notes in Computer Science #528,. Springer-Verlag, New York
-
A.W. Appel and D.B. MacQueen, “Standard ML of New Jersey”, Third International Symposium on Programming Language Implementation and Logic Programming, Passau, Germany, August 1991. Also appears in J. Maluszynski and M. Wirsing, eds., Programming Language Implementation and Logic Programming, Lecture Notes in Computer Science #528, pp. 1-13, Springer-Verlag, New York (1991).
-
(1991)
Third International Symposium on Programming Language Implementation and Logic Programming
, pp. 1-13
-
-
Appel, A.W.1
MacQueen, D.B.2
-
4
-
-
0028462563
-
Optimally profiling and tracing programs
-
July
-
T. Ball and J.R. Larus, “Optimally Profiling and Tracing Programs”, ACM Transactions on Programming Languages and Systems 16, 3, pp. 1319-1360, July 1994.
-
(1994)
ACM Transactions on Programming Languages and Systems
, vol.16
, Issue.3
, pp. 1319-1360
-
-
Ball, T.1
Larus, J.R.2
-
5
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Santa Barbara, California, August 2001. Also J. Kilian, ed., Advances in Cryptology CRYPTO 2001, Lecture Notes in Computer Science #2139,. Springer-Verlag, New York
-
B. Barak, O. Goldreich, R. Impagaliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, “On the (Im)possibility of Obfuscating Programs”, 21st Annual International Cryptography Conference, Santa Barbara, California, August 2001. Also appears in J. Kilian, ed., Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science #2139, pp. 1-18, Springer-Verlag, New York (2001).
-
(2001)
21st Annual International Cryptography Conference
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagaliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
6
-
-
85084162095
-
The crisis wide area security architecture
-
San Antonio, Texas, January
-
E. Belani, A. Vahdat, T. Anderson, and M. Dahlin, “The CRISIS Wide Area Security Architecture”, Seventh USENIX Security Symposium, San Antonio, Texas, January 1998.
-
(1998)
Seventh USENIX Security Symposium
-
-
Belani, E.1
Vahdat, A.2
Anderson, T.3
Dahlin, M.4
-
7
-
-
33845391963
-
An approach to the obfuscation of control-flow of sequential computer programs
-
Malaga, Spain, October
-
S. Chow, Y. Gu, H. Johnson, and V.A. Zakharov, “An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs”, Information Security Conference ‘01, Malaga, Spain, October 2001.
-
(2001)
Information Security Conference ‘01
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
8
-
-
0031620963
-
Breaking abstractions and unstructuring data structures
-
Chicago, Illinois, May
-
C. Collberg, C. Thomborson, and D. Low, “Breaking Abstractions and Unstructuring Data Structures”, IEEE International Conference on Computer Languages, Chicago, Illinois, May 1998.
-
(1998)
IEEE International Conference on Computer Languages
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0038289749
-
Efficient algorithms for model checking pushdown systems
-
Chicago, Illinois, July
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon, “Efficient Algorithms for Model Checking Pushdown Systems”, 12th Conference on Computer Aided Verification, Chicago, Illinois, July 2000.
-
(2000)
12th Conference on Computer Aided Verification
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
11
-
-
85077625657
-
-
Springer-Verlag, New York
-
Also appears in E.A. Emerson and A.P. Sistla, eds., Computer Aided Verification, Lecture Notes in Computer Science #1855, pp. 232-247, Springer-Verlag, New York (2000).
-
(2000)
Computer Aided Verification, Lecture Notes in Computer Science #1855
, pp. 232-247
-
-
Emerson, E.A.1
Sistla, A.P.2
-
12
-
-
84900295726
-
Scalable networked information processing environment (SNIPE)
-
San Jose, California, November
-
G.E. Fagg, K. Moore, and J.J. Dongarra, “Scalable Networked Information Processing Environment (SNIPE)”, Supercomputing ‘97, San Jose, California, November 1997.
-
(1997)
Supercomputing ‘97
-
-
Fagg, G.E.1
Moore, K.2
Dongarra, J.J.3
-
13
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, California, May
-
S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff, “A Sense of Self for Unix Processes”, 1996 IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1996.
-
(1996)
1996 IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
0031153727
-
Globus: A metacomputing infrastructure toolkit
-
Summer
-
I. Foster and C. Kesselman, “Globus: A Metacomputing Infrastructure Toolkit”, The International Journal of Supercomputer Applications and High Performance Computing 11, 2, pp. 115-129, Summer 1997.
-
(1997)
The International Journal of Supercomputer Applications and High Performance Computing
, vol.11
, Issue.2
, pp. 115-129
-
-
Foster, I.1
Kesselman, C.2
-
16
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, California, April
-
A.K. Ghosh, A. Schwartzbard, and M. Schatz, “Learning Program Behavior Profiles for Intrusion Detection”, 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999.
-
(1999)
1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
19
-
-
0002197352
-
An n log n algorithm for minimizing states in a finite automaton
-
Academic Press, New York
-
J. Hopcroft, An n log n Algorithm for Minimizing States in a Finite Automaton, Theory of Machines and Computations, pp. 189-196, Academic Press, New York (1971).
-
(1971)
Theory of Machines and Computations
, pp. 189-196
-
-
Hopcroft, J.1
-
20
-
-
0003620778
-
-
Addison Wesley, Boston
-
J.E. Hopcroft, R. Motwani, and J.D. Ullman, Introduction to Automata Theory, Languages, and Computation, Addison Wesley, Boston (2001).
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
22
-
-
0003799593
-
Partial evaluation and automatic program generation
-
Prentice Hall, Englewood Cliffs, New Jersey
-
N.D. Jones, C.K. Gomard, and P. Sestoft, Partial Evaluation and Automatic Program Generation, Prentice Hall International Series in Computer Science, Prentice Hall, Englewood Cliffs, New Jersey (1993).
-
(1993)
Prentice Hall International Series in Computer Science
-
-
Jones, N.D.1
Gomard, C.K.2
Sestoft, P.3
-
23
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando, Florida
-
C. Ko, G. Fink, and K. Levitt, “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring”, 10th Annual Computer Security Applications Conference, Orlando, Florida, 1994.
-
(1994)
10th Annual Computer Security Applications Conference
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
24
-
-
0033726577
-
Logic induction of valid behavior specifications for intrusion detection
-
Oakland, California
-
C. Ko, “Logic Induction of Valid Behavior Specifications for Intrusion Detection”, 2000 IEEE Symposium on Security and Privacy, Oakland, California, 2000.
-
(2000)
2000 IEEE Symposium on Security and Privacy
-
-
Ko, C.1
-
25
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem”, ACM Transactions on Programming Languages and Systems 4, 3, pp. 382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
27
-
-
0024138827
-
Condor–a hunter of idle workstations
-
San Jose, California, June
-
M. Litzkow, M. Livny, and M. Mutka, “Condor–A Hunter of Idle Workstations”, 8th International Conference on Distributed Computer Systems, San Jose, California, June 1988.
-
(1988)
8th International Conference on Distributed Computer Systems
-
-
Litzkow, M.1
Livny, M.2
Mutka, M.3
-
28
-
-
0035354794
-
Playing inside the black box: Using dynamic instrumentation to create security holes
-
June/September Also the Second Los Alamos Computer Science Institute Symposium, Sante Fe, NM October 2001
-
B.P. Miller, M. Christodorescu, R. Iverson, T. Kosar, A. Mirgorodskii, and F. Popovici, “Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes”, Parallel Processing Letters 11, 2/3, pp. 267-280, June/September 2001. Also appears in the Second Los Alamos Computer Science Institute Symposium, Sante Fe, NM (October 2001).
-
(2001)
Parallel Processing Letters
, vol.11
, Issue.2-3
, pp. 267-280
-
-
Miller, B.P.1
Christodorescu, M.2
Iverson, R.3
Kosar, T.4
Mirgorodskii, A.5
Popovici, F.6
-
29
-
-
0032295876
-
Program analysis via graph reachability
-
November/December
-
T. Reps, “Program Analysis via Graph Reachability”, Information and Software Technology 40, 11/12, pp. 701-726, November/December 1998.
-
(1998)
Information and Software Technology
, vol.40
, Issue.11-12
, pp. 701-726
-
-
Reps, T.1
-
30
-
-
0016081584
-
Protection and the control of information sharing in multics
-
July
-
J.H. Saltzer, “Protection and the Control of Information Sharing in Multics”, Communications of the ACM 17, 7, pp. 388-402, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
31
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
G. Vigna, ed, Springer-Verlag, New York
-
T. Sander and C.F. Tschudin, “Protecting Mobile Agents Against Malicious Hosts”, in G. Vigna, ed., Mobile Agents and Security, Lecture Notes in Computer Science #1419, pp. 44-60, Springer-Verlag, New York (1998).
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science #1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
34
-
-
84889281740
-
-
11 May
-
Sun Microsystems, Java Virtual Machines, 11 May 2002, http://java.sun.com/j2se/1.4/docs/guide/vm/.
-
(2002)
Java Virtual Machines
-
-
-
35
-
-
0000990322
-
A survey of program slicing techniques
-
September
-
F. Tip, “A Survey of Program Slicing Techniques”, Journal of Programming Languages 3, 3, pp.121-189, September 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
36
-
-
84959004252
-
Webos: Operating system services for wide area applications
-
Chicago, Illinois, July
-
A. Vahdat, T. Anderson, M. Dahlin, E. Belani, D. Culler, P. Eastham, and C. Yoshikawa, “WebOS: Operating System Services for Wide Area Applications”, Seventh International Symposium on High Performance Distributed Computing, Chicago, Illinois, July 1998.
-
(1998)
Seventh International Symposium on High Performance Distributed Computing
-
-
Vahdat, A.1
Anderson, T.2
Dahlin, M.3
Belani, E.4
Culler, D.5
Eastham, P.6
Yoshikawa, C.7
-
39
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
Goteborg, Sweden, July
-
C. Wang, J. Davidson, J. Hill, and J. Knight, “Protection of Software-based Survivability Mechanisms”, International Conference of Dependable Systems and Networks, Goteborg, Sweden, July 2001.
-
(2001)
International Conference of Dependable Systems and Networks
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
40
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, California, May
-
C. Warrender, S. Forrest, and B. Pearlmutter, “Detecting Intrusions Using System Calls: Alternative Data Models”, 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 1999.
-
(1999)
1999 IEEE Symposium on Security and Privacy
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|