Sciweavers

222 search results - page 45 / 45
» Trust Trade-off Analysis for Security Requirements Engineeri...
Sort
View
ACMSE
2009
ACM
13 years 11 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
CASCON
1996
126views Education» more  CASCON 1996»
13 years 6 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...