Sciweavers

4511 search results - page 538 / 903
» Observation Based System Security
Sort
View
ACC
2011
65views more  ACC 2011»
14 years 4 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
HIPEAC
2005
Springer
15 years 10 months ago
Garbage Collection Hints
This paper shows that Appel-style garbage collectors often make suboptimal decisions both in terms of when and how to collect. We argue that garbage collection should be done when ...
Dries Buytaert, Kris Venstermans, Lieven Eeckhout,...
RE
2005
Springer
15 years 10 months ago
Multi-Dimensional Separation of Concerns in Requirements Engineering
Existing requirements engineering approaches manage broadly scoped requirements and constraints in a fashion that is largely two-dimensional, where functional requirements serve a...
Ana Moreira, Awais Rashid, João Araú...
163
Voted
HPDC
2002
IEEE
15 years 9 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
WORDS
2002
IEEE
15 years 9 months ago
Deriving Interaction-Prone Scenarios in Feature Interaction Filtering with Use Case Maps
Feature interactions (FIs, in short) occur when features of different communication services interfere with each other. The FI filtering is a pre-processing before the FI detecti...
Masahide Nakamura, Pattara Leelaprute, Tohru Kikun...