Sciweavers

3133 search results - page 126 / 627
» Difference systems of sets and cyclotomy
Sort
View
ICSE
2012
IEEE-ACM
13 years 10 days ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 4 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
CCR
2004
147views more  CCR 2004»
14 years 9 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
GRID
2006
Springer
14 years 10 months ago
The Palantir Grid Meta-Information System
Grids allow large scale resource-sharing across different administrative domains. Those diverse resources are likely to join or quit the Grid at any moment or possibly to break dow...
Francesc Guim, Ivan Rodero, M. Tomas, Julita Corba...
IIE
2006
113views more  IIE 2006»
14 years 10 months ago
Gender and Programming Contests: Mitigating Exclusionary Practices
Individuals vary across many dimensions due to the effects of gender-based, personality, and cultural differences. Consequently, programming contests with a limited and rigid stru...
Maryanne Fisher, Anthony Cox