publié le: December 1975
This paper presents a taxonomy, or naming scheme, for systems of interconnected computers. It is an attempt to provide an implementation-independent...
publié le: September 2011
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known c...
This paper is a tutorial survey of the area of parallel and associative processors. The paper covers the main design tradeoffs and major architecture...
publié le: March 1976
This paper deals with the history and definitions common to data-base technology. It delimits the objectives of data-base management systems, discus...
Traditional security protocols are mainly concerned with authentication and key establishment and rely on predistributed keys and properties of crypt...