Sciweavers

5615 search results - page 975 / 1123
» Active Learner Modelling
Sort
View
115
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
148
Voted
DEXAW
2003
IEEE
168views Database» more  DEXAW 2003»
15 years 9 months ago
Visualisation of (Distributed) Process Execution based on Extended BPMN
In order to create, share and improve knowledge on business processes, humans need a common, readable and preferably visual notation. So far, a lot of effort has been put into vis...
Mariusz Momotko, Bartosz Nowicki
144
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
— Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In th...
Sheng Zhong, Jiang Chen, Yang Richard Yang
132
Voted
IWPC
2003
IEEE
15 years 9 months ago
YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs
In the last decades several tools and environments defined and introduced languages for querying, navigating sforming abstract syntax trees. These environments were meant to supp...
Giuliano Antoniol, Massimiliano Di Penta, Ettore M...
103
Voted
MICRO
2003
IEEE
96views Hardware» more  MICRO 2003»
15 years 9 months ago
Using Interaction Costs for Microarchitectural Bottleneck Analysis
Attacking bottlenecks in modern processors is difficult because many microarchitectural events overlap with each other. This parallelism makes it difficult to both (a) assign a ...
Brian A. Fields, Rastislav Bodík, Mark D. H...