Sciweavers

1286 search results - page 164 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
92
Voted
PODC
2009
ACM
16 years 1 months ago
On a selfish caching game
In this work we define and study a new model for the caching problem in a heterogeneous wireless network under a flash-crowd scenario. Using non-cooperative game theory, we cast t...
Pietro Michiardi, Carla-Fabiana Chiasserini, Claud...
87
Voted
IPPS
2008
IEEE
15 years 7 months ago
Towards effective automatic parallelization for multicore systems
The ubiquity of multicore processors in commodity computing systems has raised a significant programming challenge for their effective use. An attractive but challenging approach...
Uday Bondhugula, Muthu Manikandan Baskaran, Albert...
101
Voted
CCS
2007
ACM
15 years 6 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
92
Voted
RAID
2005
Springer
15 years 6 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
109
Voted
CAISE
2003
Springer
15 years 5 months ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp