Sciweavers

6229 search results - page 1021 / 1246
» Models of Computation for Networks on Chip
Sort
View
JCP
2006
100views more  JCP 2006»
15 years 11 days ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
109
Voted
RAID
2007
Springer
15 years 6 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
113
Voted
ISORC
2006
IEEE
15 years 6 months ago
RTSTREAM: Real-Time Query Processing for Data Streams
Many real-time applications, such as traffic control systems, surveillance systems and health monitoring systems, need to operate on continuous unbounded streams of data. These ap...
Yuan Wei, Sang Hyuk Son, John A. Stankovic
101
Voted
CCS
2004
ACM
15 years 5 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
111
Voted
JAIR
2000
105views more  JAIR 2000»
15 years 6 days ago
Reasoning on Interval and Point-based Disjunctive Metric Constraints in Temporal Contexts
We introduce a temporal model for reasoning on disjunctive metric constraints on intervals and time points in temporal contexts. This temporal model is composed of a labeled tempo...
Federico Barber
« Prev « First page 1021 / 1246 Last » Next »