Sciweavers

9989 search results - page 1891 / 1998
» A CLP Approach to Modelling Systems
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ACSC
2003
IEEE
15 years 9 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
APCSAC
2003
IEEE
15 years 9 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
HICSS
2003
IEEE
166views Biometrics» more  HICSS 2003»
15 years 9 months ago
Comparative Genome Annotation for Mapping, Prediction and Discovery of Genes
We have used comparative genome analyses to produce annotated maps for large genomic loci. The first example is a locus on mouse chromosome 9 that is syntenic to human chromosome ...
Claudia Kappen, J. Michael Salbaum
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
« Prev « First page 1891 / 1998 Last » Next »