Sciweavers

5465 search results - page 1039 / 1093
» Assigning Types to Processes
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
AIPR
2002
IEEE
15 years 2 months ago
Hyperspectral Imaging of Kaposi's Sarcoma for Disease Assessment and Treatment Monitoring
Light spectroscopic methods are critical to advances in molecular characterization of disease processes. However, these methods have been limited to in-vitro or cell culture studi...
David Hattery, Moinuddin Hassan, Stavros Demos, Am...
CSFW
2002
IEEE
15 years 2 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
DEXAW
2002
IEEE
148views Database» more  DEXAW 2002»
15 years 2 months ago
A Practical Approach to Multi-Attribute Auctions
In most electronic auctions conducted over the Internet today price is still the only decision criteria for the best bid. This is true for all sorts of auctions in the electronic ...
Birgit Burmeister, Tobias Ihde, Thomas Kittsteiner...
SIGMETRICS
2010
ACM
187views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Can multipath mitigate power law delays?: effects of parallelism on tail performance
—Parallelism has often been used to improve the reliability and efficiency of a variety of different engineering systems. In this paper, we quantify the efficiency of paralleli...
Jian Tan, Wei Wei, Bo Jiang, Ness Shroff, Donald F...
« Prev « First page 1039 / 1093 Last » Next »