Sciweavers

1995 search results - page 36 / 399
» From Data Flow Networks to Process Algebras
Sort
View
ICASSP
2009
IEEE
15 years 4 months ago
Multi-flow attack resistant watermarks for network flows
In this work we present a Multi-flow Attack Resistant Interval Centroid Based Watermarking (MAR-ICBW) scheme for network flows. Our proposed scheme can withstand the newly intro...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
IJCIM
2007
82views more  IJCIM 2007»
14 years 9 months ago
Towards a classification framework for interoperability of enterprise applications
: Software applications interoperability is a challenge for modern enterprises. It needs establishing standards and protocols for data exchange between different enterprise systems...
Hervé Panetto
WSC
2004
14 years 11 months ago
Automated Database and Schema-Based Data Interchange for Modeling and Simulation
Creating a simulation of a large enterprise system by manually coding all the details into a simulator tool is not just time consuming, but yields a system that is difficult to ma...
Gregory A. Harrison, David S. Maynard, Eytan Polla...
DOLAP
2007
ACM
15 years 1 months ago
Optimal chunking of large multidimensional arrays for data warehousing
ss domain. Using this more abstract approach means that more data sources of varying types can be incorporated with less effort, and such heterogeneous data sources might be very r...
Ekow J. Otoo, Doron Rotem, Sridhar Seshadri
NSDI
2008
15 years 2 days ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...