Sciweavers

4311 search results - page 560 / 863
» Code Generation for Distributed Systems
Sort
View
94
Voted
ASM
2000
ASM
15 years 5 months ago
Report on a Practical Application of ASMs in Software Design
ASMs have been used at Siemens Corporate Technology to design a component in a software package called FALKO. Main purpose of FALKO is the construction and validation of timetables...
Egon Börger, Peter Päppinghaus, Joachim ...
WCRE
1999
IEEE
15 years 5 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
ICPADS
2008
IEEE
15 years 7 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 1 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
87
Voted
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 7 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...