Sciweavers

1363 search results - page 80 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
120
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
PDP
2009
IEEE
15 years 10 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
108
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 9 months ago
Modeling Channel Occupancy Times for Voice Traffic in Cellular Networks
—Call holding times in telephony networks are commonly approximated by exponential distributions to facilitate traffic engineering. However, for traffic engineering of cellular n...
Emre A. Yavuz, Victor C. M. Leung
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 9 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
FOCI
2007
IEEE
15 years 9 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe