Sciweavers

505 search results - page 41 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
14 years 10 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 4 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
PET
2012
Springer
13 years 3 days ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
ICSE
2012
IEEE-ACM
13 years 2 days ago
make test-zesti: A symbolic execution solution for improving regression testing
Abstract—Software testing is an expensive and time consuming process, often involving the manual creation of comprehensive regression test suites. However, current testing method...
Paul Dan Marinescu, Cristian Cadar
NOSSDAV
2001
Springer
15 years 2 months ago
Network support for mobile multimedia using a self-adaptive distributed proxy
Recent advancements in video and audio codec technologies (e.g., RealVideo [18]) make multimedia streaming possible across a wide range of network conditions. With an increasing t...
Zhuoqing Morley Mao, Hoi-sheung Wilson So, Byungho...