Sciweavers

1424 search results - page 257 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
KBSE
2000
IEEE
15 years 5 months ago
Model Checking Programs
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it eas...
Willem Visser, Klaus Havelund, Guillaume P. Brat, ...
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
15 years 5 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
CONEXT
2007
ACM
15 years 5 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
CCGRID
2004
IEEE
15 years 5 months ago
Learning Grid technologies in a project-based computer architecture course
This paper describes the integration of the grid topic within a Computer Architecture engineering course. Students are engaged in a project of design and evaluation of computing s...
Guillermo Vega-Gorgojo, Yannis A. Dimitriadis, Edu...
ECML
2006
Springer
15 years 5 months ago
Bayesian Active Learning for Sensitivity Analysis
Abstract. Designs of micro electro-mechanical devices need to be robust against fluctuations in mass production. Computer experiments with tens of parameters are used to explore th...
Tobias Pfingsten