Sciweavers

4516 search results - page 106 / 904
» Automated System Design for Availability
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
ACMACE
2005
ACM
15 years 3 months ago
Achieving fairness in multiplayer network games through automated latency balancing
Over the past few years, the prominence of multiplayer network gaming has increased dramatically in the Internet. The effect of network delay (lag) on multiplayer network gaming h...
Sebastian Zander, Ian Leeder, Grenville J. Armitag...
ER
2008
Springer
136views Database» more  ER 2008»
14 years 11 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
WIDM
2003
ACM
15 years 3 months ago
Datarover: a taxonomy based crawler for automated data extraction from data-intensive websites
The advent of e-commerce has created a trend that brought thousands of catalogs online. Most of these websites are “taxonomy-directed”. A Web site is said to be ``taxonomydire...
Hasan Davulcu, S. Koduri, Saravanakumar Nagarajan
JAR
2006
103views more  JAR 2006»
14 years 10 months ago
A Framework for Verifying Bit-Level Pipelined Machines Based on Automated Deduction and Decision Procedures
We describe an approach to verifying bit-level pipelined machine models using a combination of deductive reasoning and decision procedures. While theorem proving systems such as AC...
Panagiotis Manolios, Sudarshan K. Srinivasan