Konferenzbeitrag (937)

1141.
Konferenzbeitrag
Haeberlen, A.; Aditya, P.; Rodrigues, R.; Druschel, P.: Accountable virtual machines. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’10), S. 1 - 16. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010), Vancouver, Canada, 04. Oktober 2010 - 06. Oktober 2010. USENIX Association, Berkeley, CA (2010)
1142.
Konferenzbeitrag
Jose, M.; Hu, Y.; Majumdar, R.: On power and fault-tolerance optimization in FPGA physical synthesis. In: 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), S. 224 - 229. 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, 07. November 2010 - 11. November 2010. IEEE, Piscataway, NJ (2010)
1143.
Konferenzbeitrag
Kate, A.; Zaverucha, G. M.; Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, S. 177 - 194 (Hg. Abe, M.). 16th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010), Singapore, 05. Dezember 2010 - 09. Dezember 2010. Springer, Berlin (2010)
1144.
Konferenzbeitrag
Köpf, B.; Rybalchenko, A.: Approximation and randomization for quantitative information-flow analysis. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, S. 3 - 14. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, 17. Juli 2010 - 19. Juli 2010. IEEE, Piscataway, NJ (2010)
1145.
Konferenzbeitrag
Köpf, B.; Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, S. 44 - 56. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, 17. Juli 2010 - 19. Juli 2010. IEEE, Piscataway, NJ (2010)
1146.
Konferenzbeitrag
Majumdar, R.; Saha, I.; Wang, Z.: Systematic testing for control applications. In: 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), S. 1 - 10. 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), Grenoble, 26. Juli 2010 - 28. Juli 2010. IEEE, Piscataway, NJ (2010)
1147.
Konferenzbeitrag
Mislove, A.; Viswanath, B.; Gummadi, K. P.; Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search & Data Mining (WSDM), S. 251 - 260. Third ACM International Conference on Web Search & Data Mining (WSDM 2010), New York, NY, 03. Februar 2010 - 06. Februar 2010. ACM, New York, NY (2010)
1148.
Konferenzbeitrag
Rossberg, A.; Russo, C. V.; Dreyer, D.: F-ing modules. In: TLDI’10: proceedings of the 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation, S. 89 - 102. 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation (TLDI 2010), Madrid, 23. Januar 2010. ACM, New York, NY (2010)
1149.
Konferenzbeitrag
Viswanath, B.; Post, A.; Gummadi, K. P.; Mislove, A.: An analysis of social network-based Sybil defenses. In: SIGCOMM’10: proceedings of the SIGCOMM 2010 Conference, S. 363 - 374. SIGCOMM 2010 Conference, New Delhi, 30. August 2010 - 03. September 2010. ACM, New York, NY (2010)
1150.
Konferenzbeitrag
Wieder, A.; Bhatotia, P.; Post, A.; Rodrigues, R.: Conductor: orchestrating the clouds. In: Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2010), S. 44 - 48. 4th International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2010), Zürich, 28. Juli 2010 - 29. Juli 2010. ACM, New York, NY (2010)
1151.
Konferenzbeitrag
Wieder, A.; Bhatotia, P.; Post, A.; Rodrigues, R.: Brief announcement: Modelling MapReduce for optimal execution in the cloud. In: PODC’10: proceedings of the 2010 ACM Symposium on Principles of Distributed Computing, S. 408 - 409. 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2010), Zürich, 25. Juli 2010 - 28. Juli 2010. ACM, New York, NY (2010)
1152.
Konferenzbeitrag
Ahmed, A.; Dreyer, D.; Rossberg, A.: State-dependent representation independence. In: POPL’09 Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, S. 340 - 353. 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Savannah, Georgia, 21. Januar 2009 - 23. Januar 2009. ACM, New York, NY (2009)
1153.
Konferenzbeitrag
Antunas, G.; Barateiro, J.; Cabral, M.; Borbinha, J.; Rodrigues, R.: Preserving digital data in heterogeneous environments. In: JCDL’09: proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries, S. 345 - 348. 2009 ACM/IEEE Joint Conference on Digital Libraries (JCDL'09), Austin, Texas, 15. Juni 2009 - 19. Juni 2009. ACM, New York, NY (2009)
1154.
Konferenzbeitrag
Backes, M.; Chen, T.; Dürmuth, M.; Lensch, H. P. A.; Welk, M.: Tempest in a teapot: compromising reflections revisited. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, S. 315 - 327. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, 17. Mai 2009 - 20. Mai 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1155.
Konferenzbeitrag
Backes, M.; Druschel, P.; Haeberlen, A.; Unruh, D.: CSAR: A Practical and Probable Technique to Make Randomized Systems Accountable. In: 2009 Network and Distributed System Security Symposium, S. 341 - 353. 16th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, 08. Februar 2009 - 11. Februar 2009. Internet Society, Reston, VA (2009)
1156.
Konferenzbeitrag
Backes, M.; Grochulla, M. P.; Hritcu, C.; Maffei, M.: Achieving security despite compromise using zero-knowledge. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, S. 308 - 323. 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, NY, 08. Juli 2009 - 10. Juli 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1157.
Konferenzbeitrag
Backes, M.; Hamerlik, M.; Linari, A.; Maffei, M.; Tryfonopoulos, C.; Weikum, G.: Anonymity and censorship resistance in unstructured overlay networks. In: On the Move to Meaningful Internet Systems: OTM 2009: proceedings. - Part I, S. 147 - 164 (Hg. Meersman, R.; Dillon, T.; Herrero, P.). Confederated International Conferences CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, 01. November 2009 - 06. November 2009. Springer, Berlin (2009)
1158.
Konferenzbeitrag
Backes, M.; Hofheinz, D.; Unruh, D.: CoSP: a general framework for computational soundness proofs. In: CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, S. 66 - 78. 16th ACM Conference on Computer and Communications Security, Chicago, Ill., 09. November 2009 - 13. November 2009. ACM, New York, NY (2009)
1159.
Konferenzbeitrag
Backes, M.; Köpf, B.; Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, S. 141 - 153. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, 17. Mai 2009 - 20. Mai 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1160.
Konferenzbeitrag
Benevenuto, F.; Rodrigues, T.; Cha, M.; Almeida, V.: Characterizing user behavior in online social networks. In: IMC’09 Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference, S. 49 - 62. 2009 ACM SIGCOMM Internet Measurement Conference, Chicago, Ill., 04. November 2009 - 06. November 2009. ACM, New York, NY (2009)
Zur Redakteursansicht