Sciweavers

9405 search results - page 1808 / 1881
» Computing a Model of Set Theory
Sort
View
SAC
2010
ACM
15 years 6 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
SC
2009
ACM
15 years 6 months ago
FALCON: a system for reliable checkpoint recovery in shared grid environments
In Fine-Grained Cycle Sharing (FGCS) systems, machine owners voluntarily share their unused CPU cycles with guest jobs, as long as the performance degradation is tolerable. For gu...
Tanzima Zerin Islam, Saurabh Bagchi, Rudolf Eigenm...
ICASSP
2008
IEEE
15 years 6 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
15 years 6 months ago
KnowFlow - A Hybrid Approach to Identifying and Visualizing Distributed Knowledge Work Practices
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...
Markus Strohmaier, Stefanie N. Lindstaedt
QEST
2007
IEEE
15 years 6 months ago
Qualitative Logics and Equivalences for Probabilistic Systems
We investigate logics and equivalence relations that capture the qualitative behavior of Markov Decision Processes (MDPs). We present Qualitative Randomized Ctl (Qrctl): formulas o...
Luca de Alfaro, Krishnendu Chatterjee, Marco Faell...
« Prev « First page 1808 / 1881 Last » Next »