Sciweavers

1733 search results - page 120 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
RAID
2005
Springer
15 years 7 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
IJCNN
2000
IEEE
15 years 6 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
129
Voted
EMSOFT
2007
Springer
15 years 5 months ago
A unified practical approach to stochastic DVS scheduling
This paper deals with energy-aware real-time system scheduling using dynamic voltage scaling (DVS) for energy-constrained embedded systems that execute variable and unpredictable ...
Ruibin Xu, Rami G. Melhem, Daniel Mossé
139
Voted
CSMR
2002
IEEE
15 years 6 months ago
Integrating Document and Workflow Management Tools using XML and Web Technologies: A Case Study
A critical point for developing successful information systems for distributed organisations is the need for integrating heterogeneous technologies and tools. This paper reports a...
Lerina Aversano, Gerardo Canfora, Andrea De Lucia,...
AIEDU
2007
83views more  AIEDU 2007»
15 years 1 months ago
Evidence-based Approach to Interacting with Open Student Models
Research efforts focused on developing "active reports" are currently underway. Active reports are designed to foster communication among teachers, students, and parents ...
Diego Zapata-Rivera, Eric G. Hansen, Valerie J. Sh...