Sciweavers

3133 search results - page 166 / 627
» Difference systems of sets and cyclotomy
Sort
View
100
Voted
ATVA
2006
Springer
109views Hardware» more  ATVA 2006»
15 years 4 days ago
Proactive Leader Election in Asynchronous Shared Memory Systems
Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speakin...
M. C. Dharmadeep, K. Gopinath
ECIS
2004
14 years 11 months ago
Measuring enterprise systems success: the importance of a multiple stakeholder perspective
: Organisations invest enormous amount of resources in acquiring Enterprise Systems (ES), presumably expecting positive impacts to the organisation and its functions. Despite the o...
Darshana Sedera, Guy G. Gable, Taizan Chan
ACSAC
2009
IEEE
15 years 5 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ACMSE
2005
ACM
15 years 3 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
INFOSCALE
2007
ACM
14 years 11 months ago
Scalable problem localization for distributed systems: principles and practices
Problem localization is a critical part of providing crucial system management capabilities to modern distributed environments. One key open challenge is for problem localization ...
Rui Zhang, Bruno C. d. S. Oliveira, Alan Bivens, S...