Sciweavers

4150 search results - page 151 / 830
» A Practical Approach to Model Extension
Sort
View
135
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
128
Voted
ESA
1998
Springer
154views Algorithms» more  ESA 1998»
15 years 8 months ago
A Functional Approach to External Graph Algorithms
We present a new approach for designing external graph algorithms and use it to design simple, deterministic and randomized external algorithms for computing connected components, ...
James Abello, Adam L. Buchsbaum, Jeffery Westbrook
138
Voted
HICSS
2009
IEEE
161views Biometrics» more  HICSS 2009»
15 years 7 months ago
Configurative Service Engineering - A Rule-Based Configuration Approach for Versatile Service Processes in Corrective Maintenanc
Recently, service orientation has increasingly been debated both in research and practice. While researchers postulate a paradigm shift towards services as the basic unit of excha...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
116
Voted
WSC
2004
15 years 5 months ago
Stochastic Approximation with Simulated Annealing as an Approach to Global Discrete-Event Simulation Optimization
This paper explores an approach to global, stochastic, simulation optimization which combines stochastic approximation (SA) with simulated annealing (SAN). SA directs a search of ...
Matthew H. Jones, K. Preston White
123
Voted
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...