Results 1 - 10
of
196
Proactive Obfuscation
"... Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions. The periodic restarts help bound the ..."
Abstract
-
Cited by 20 (1 self)
- Add to MetaCart
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions. The periodic restarts help bound
Proactive detection of collaboration conflicts
- In Proc. ESEC/FSE
, 2011
"... Have you ever made a mistake while programming and only realized it later? • design decision • refactoring • repeated someone else’s work speculative analysis collaborative conflicts utility evaluation contributions References Speculative analysis: Predict the future and analyze it current program 3 ..."
Abstract
-
Cited by 32 (8 self)
- Add to MetaCart
program speculate 3 / 17 speculative analysis collaborative conflicts utility evaluation contributions References Exploring the future past version of the program continuous testing delta debugging autom ated debugging present version of the program future version
Evolving Proactive Aggregation Protocols
"... Abstract. We present an approach for the automated synthesis of proactive aggregation protocols using Genetic Programming and discuss major decisions in modeling and simulating distributed aggregation protocols. We develop a genotype, which is an abstract specification form for aggregation protocols ..."
Abstract
- Add to MetaCart
Abstract. We present an approach for the automated synthesis of proactive aggregation protocols using Genetic Programming and discuss major decisions in modeling and simulating distributed aggregation protocols. We develop a genotype, which is an abstract specification form for aggregation
Inhibitory Control of Proactive Interference in Adults With ADHD
, 2007
"... The online version of this article can be found at: ..."
June 2013Proactively Accountable Anonymous Messaging in Verdict Extended Version
"... Among anonymity systems, DC-nets have long held attraction for their resistance to traffic analysis attacks, but practical implementations remain vulnerable to internal disruption or “jamming ” attacks, which require timeconsuming detection procedures to resolve. We present Verdict, the first practi ..."
Abstract
- Add to MetaCart
practical anonymous group communication system built using proactively verifiable DC-nets: participants use public-key cryptography to construct DC-net ciphertexts, and use zero-knowledge proofs of knowledge to detect and exclude misbehavior before disruption. We compare three alternative constructions
Prediction and Proactivity in Real-Time Interactive Music Systems
"... This is the author’s version of a work that was submitted/accepted for pub-lication in the following source: ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This is the author’s version of a work that was submitted/accepted for pub-lication in the following source:
Verilogo: Proactive phishing detection via logo recognition
, 2011
"... Defending users against fraudulent Websites (i.e., phishing) is a task that is reactive in practice. Blacklists, spam filters, and takedowns all depend on first finding new sites and verifying that they are fraudulent. In this paper we explore an alternative approach that uses a combination of compu ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
of computer-vision techniques to proactively identify likely phishing pages as they are rendered, interactive queries to validate such pages with brand holders, and a single keyboard-entry filter to minimize false positives. We have developed a prototype version of this approach within the Firefox browser
Proactive Route Maintenance (PRM) 1 V.Ramesh
"... Abstract- Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR algorithm finds an alternative route when the existing communicating route goes down. I ..."
Abstract
- Add to MetaCart
from the received packets to predict the link breakage time, and sends a warning to the source node of the packet if the link is soon-to-be-broken. The source node can perform a pro-active route rebuild to avoid disconnection. Intermediate nodes in the route continuously monitor the signal strength
Real-Time Reliable Multicast Using Proactive Forward Error Correction,” NOSSDAV ’98
, 1998
"... Real-Time reliable multicast over a best-effort service network remains a challenging research problem. Most protocols for reliable multicast use repair techniques that result in significant and variable delay, which can lead to missed deadlines in real-time scenarios. This paper presents a repair t ..."
Abstract
-
Cited by 50 (3 self)
- Add to MetaCart
technique that combines forward error correction (FEC) with automatic repeat request (ARQ). The novel aspect of the technique is its ability to reduce delay in reliable multicast delivery by sending repairs proactively (i.e., before they are required). The technique requires minimal state at senders
definitive version of this work, please refer to the published source: Person-Organisation Fit and Employee Proactivity: Do Shared Values Matter?
"... This is the author’s version of a work that was submitted/accepted for publication in the following source: ..."
Abstract
- Add to MetaCart
This is the author’s version of a work that was submitted/accepted for publication in the following source:
Results 1 - 10
of
196