• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 858
Next 10 →

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances

Applications of random amplified polymorphic DNA (RAPD) in molecular ecology.Molecular Ecology

by Heike Hadrys, Bernd Schierwater, H. Hadrys, M. Balick, B. Schierwatert , 1992
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Cited by 95 (4 self) - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Sirius: Securing remote untrusted storage

by Eu-jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh - in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003 , 2003
"... This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. ..."
Abstract - Cited by 148 (2 self) - Add to MetaCart
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing

On Read-Once vs. Multiple Access to Randomness in Logspace

by Noam Nisan - THEORETICAL COMPUTER SCIENCE , 1993
"... In the "correct" definition of randomized space-bounded computation, the machine has access to a random coin. The coin can be flipped at will, but outcomes of previous coin flips cannot be recalled unless they are saved in the machine's limited memory. In contrast to this read-onc ..."
Abstract - Cited by 17 (2 self) - Add to MetaCart
In the "correct" definition of randomized space-bounded computation, the machine has access to a random coin. The coin can be flipped at will, but outcomes of previous coin flips cannot be recalled unless they are saved in the machine's limited memory. In contrast to this read

Random Access Non-Random

by Eprom Mask-prog
"... Classification of memories [1] Read Write Memories (RWM) NVRWM ROM ..."
Abstract - Add to MetaCart
Classification of memories [1] Read Write Memories (RWM) NVRWM ROM

Point-to-point connectivity between neuromorphic chips using address-events

by Kwabena A. Boahen - IEEE Trans. Circuits Syst. II , 2000
"... Abstract — I discuss connectivity between neuromorphic chips, which use the timing of fixed-height, fixed-width, pulses to encode information. Address-events—log2 (N)-bit packets that uniquely identify one of N neurons—are used to transmit these pulses in real-time on a random-access, time-multiplex ..."
Abstract - Cited by 128 (19 self) - Add to MetaCart
Abstract — I discuss connectivity between neuromorphic chips, which use the timing of fixed-height, fixed-width, pulses to encode information. Address-events—log2 (N)-bit packets that uniquely identify one of N neurons—are used to transmit these pulses in real-time on a random-access, time

Group Sharing and Random Access in Cryptographic Storage File Systems

by Kevin E. Fu - MASTER’S THESIS, MIT , 1999
"... Traditional cryptographic storage uses encryption to ensure confidentiality of file data. However, encryption can prevent efficient random access to file data. Moreover, no cryptographic storage file system allows file sharing with similar semantics to UNIX group sharing. The Cryptographic Storage F ..."
Abstract - Cited by 65 (6 self) - Add to MetaCart
Traditional cryptographic storage uses encryption to ensure confidentiality of file data. However, encryption can prevent efficient random access to file data. Moreover, no cryptographic storage file system allows file sharing with similar semantics to UNIX group sharing. The Cryptographic Storage

Read-Proof Hardware from Protective Coatings

by Pim Tuyls, Geert-jan Schrijen, Boris ˇ Skorić, Jan Van Geloven, Nynke Verhaegh, Rob Wolters - In Cryptographic Hardware and Embedded Systems — CHES 2006
"... Abstract. In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In ..."
Abstract - Cited by 67 (12 self) - Add to MetaCart
an implementation of read-proof hardware that is resistant against invasive attacks. The construction is based on a hardware and a cryptographic part. The hardware consists of a protective coating that contains a lot of randomness. By performing measurements on the coating a fingerprint is derived

Lower bounds for randomized read/write stream algorithms

by Paul Beame - In Proc. STOC’07 , 2007
"... Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multiple streams. Unlike the data stream model, where the stream is read only, in this new model (introduced in [8, 9]) the al ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multiple streams. Unlike the data stream model, where the stream is read only, in this new model (introduced in [8, 9

Phase-change random access memory: A scalable technology

by S. Raoux, G. W. Burr, M. J. Breitwisch, C. T. Rettner, Y. -c. Chen, R. M. Shelby, M. Salinga, D. Krebs, S. -h. Chen, H. -l. Lung, C. H. Lam - IBM JOURNAL OF RESEARCH AND DEVELOPMENT , 2008
"... Nonvolatile RAM using resistance contrast in phase-change materials [or phase-change RAM (PCRAM)] is a promising technology for future storage-class memory. However, such a technology can succeed only if it can scale smaller in size, given the increasingly tiny memory cells that are projected for fu ..."
Abstract - Cited by 49 (1 self) - Add to MetaCart
for future technology nodes (i.e., generations). We first discuss the critical aspects that may affect the scaling of PCRAM, including materials properties, power consumption during programming and read operations, thermal cross-talk between memory cells, and failure mechanisms. We then discuss experiments
Next 10 →
Results 1 - 10 of 858
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University