Sciweavers

1604 search results - page 217 / 321
» Development Separation in Lambda-Calculus
Sort
View
109
Voted
RAID
2001
Springer
15 years 5 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
CSMR
2000
IEEE
15 years 5 months ago
Experiences Reverse Engineering Manually
Better understanding manual reverse engineering can make it and any associated systems reengineering more effective. We reverse engineered a version of a system (referred to as &q...
Dave Swafford, Diana Elman, Peter Aiken, Jeff Merh...
DCC
2000
IEEE
15 years 5 months ago
QccPack: An Open-Source Software Library for Quantization, Compression, and Coding
We describe the QccPack software package, an open-source collection of library routines and utility programs for quantization, compression, and coding of data. QccPack is being wr...
James E. Fowler
HICSS
2000
IEEE
118views Biometrics» more  HICSS 2000»
15 years 5 months ago
Analyzing Information Intermediaries in Electronic Brokerage
In the past, full-service stock brokerage firms had a strategic advantage over discount brokers because of the control full-service brokers had over the information provided to th...
Robert J. Kauffman, Mani R. Subramani, Charles A. ...
91
Voted
SSDBM
2000
IEEE
87views Database» more  SSDBM 2000»
15 years 5 months ago
A Tool for Nesting and Clustering Large Objects
In implementations of non-standard database systems, large objects are often embedded within an aggregate of different types, i.e. a tuple. For a given size and access probabilit...
Stefan Dieker, Ralf Hartmut Güting, Miguel Ro...