Sciweavers

1804 search results - page 198 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CDC
2008
IEEE
148views Control Systems» more  CDC 2008»
15 years 11 months ago
Distributed cut detection in sensor networks
— We propose a distributed algorithm to detect “cuts” in sensor networks, i.e., the failure of a set of nodes that separates the networks into two or more components. The alg...
Prabir Barooah
130
Voted
KBSE
2007
IEEE
15 years 11 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
KES
2010
Springer
15 years 2 months ago
Adaptive Modelling of Users' Strategies in Exploratory Learning Using Case-Based Reasoning
Abstract. In exploratory learning environments, learners can use different strategies to solve a problem. To the designer or teacher, however, not all these strategies are known in...
Mihaela Cocea, Sergio Gutiérrez Santos, Geo...
ICDCS
1995
IEEE
15 years 8 months ago
Implementing Sequentially Consistent Shared Objects Using Broadcast and Point-to-Point Communication
A distributed algorithm that implements a sequentially consistent collection of shared read/update objects using a combination of broadcast and point-to-point communication is pre...
Alan Fekete, M. Frans Kaashoek, Nancy A. Lynch
SIGMOD
2004
ACM
119views Database» more  SIGMOD 2004»
16 years 4 months ago
Lazy Query Evaluation for Active XML
In this paper, we study query evaluation on Active XML documents (AXML for short), a new generation of XML documents that has recently gained popularity. AXML documents are XML do...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, I...