Architecture Analysis

Results: 1991



#Item
601Network architecture / Onion routing / Tor / Router / Routing / Communications protocol / Transmission Control Protocol / Link-state routing protocol / Crowds / Internet privacy / Computing / Internet

Towards an Analysis of Onion Routing Security Paul Syverson  Gene Tsudik y Michael Reed 

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:15:23
602Infoglide Software / Record linkage / Service-oriented architecture / Link analysis / Information technology management / Computing / Data / Data management / Identity resolution / Middleware

identity resolution engine

Add to Reading List

Source URL: www.infoglide.com

Language: English - Date: 2012-02-24 15:39:26
603Biology / Dynamic programming / Sequence alignment / Smith–Waterman algorithm / Sequence analysis / Nucleic acid sequence / FASTA / Platelet-derived growth factor / DNA / Computational phylogenetics / Bioinformatics / Science

IMPLEMENTATION OF A DYNAMIC PROGRAMMING ALGORITHM FOR DNA SEQUENCE ALIGNMENT ON THE CELL MATRIX ARCHITECTURE by Bin Wang

Add to Reading List

Source URL: www.cellmatrix.com

Language: English - Date: 2002-05-14 12:57:24
604Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:11
605Simulation software / Software architecture / Systems architecture / Cross-platform software / Simulink / Architecture Analysis & Design Language / SPARK / Formal verification / Design by contract / Software engineering / Computing / Design

System to Software Integrity: A Case Study1 Matteo Bordin, Cyrille Comar, Ed Falis, Franco Gasperoni, Yannick Moy, Elie Richa, Jérôme Hugues {bordin, comar, falis, gasperoni, moy, richa}@adacore.com, jerome.hugue

Add to Reading List

Source URL: www.spark-2014.org

Language: English - Date: 2014-01-23 04:27:02
606Root / Image analysis / 3D modeling / Segmentation / Entertainment / Vision / Optics / Vegetation and slope stability / Computer vision / Visual effects / Image processing

20th International Congress on Modelling and Simulation, Adelaide, Australia, 1–6 December 2013 www.mssanz.org.au/modsim2013 3D Reconstruction, Modelling and Analysis of in Situ Root System Architecture Pankaj Kumar ,

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-11-19 22:01:59
607Computing / Domain Name System Security Extensions / Extension mechanisms for DNS / Name server / Domain name / DNS zone / Top-level domain / Root name server / DNS spoofing / Domain name system / Internet / Network architecture

Large-scale DNS and DNSSEC data sets for network security research Roland van Rijswijk-Deij1,2 , Anna Sperotto1 , and Aiko Pras1 1 Design and Analysis of Communication Systems (DACS), University of Twente,

Add to Reading List

Source URL: www.simpleweb.org

Language: English - Date: 2014-09-05 10:09:45
608Cross-platform software / CapDesk / Java / Sandbox / Malware / Confused deputy problem / Computing / System software / Software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:23
609Software engineering / Programming language implementation / Central processing unit / Computer memory / Compiler construction / Alias analysis / CPU cache / Loop unwinding / Linearizability / Computing / Computer architecture / Compiler optimizations

DeAliaser: Alias Speculation Using Atomic Region Support Wonsun Ahn Yuelu Duan Josep Torrellas

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2013-01-25 16:44:16
UPDATE