Sciweavers

2736 search results - page 443 / 548
» Implementable allocation rules
Sort
View
102
Voted
EDOC
2006
IEEE
15 years 6 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
99
Voted
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
15 years 6 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generators...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
15 years 6 months ago
A Policy-Based Hierarchical Approach for Management of Grids and Networks
Grids are distributed infrastructures that have been used as an important and powerful resource for distributed computing. Since the nodes of a grid can potentially be located in ...
Tiago Fioreze, Ricardo Neisse, Lisandro Zambenedet...
PRDC
2006
IEEE
15 years 6 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
108
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 6 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...