Sciweavers

2237 search results - page 104 / 448
» On the Security of Random Sources
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 6 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 11 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
TCSV
2002
132views more  TCSV 2002»
15 years 4 months ago
A study of real-time packet video quality using random neural networks
An important and unsolved problem today is the automatic quantification of the quality of video flows transmitted over packet networks. In particular, the ability to perform this ...
Samir Mohamed, Gerardo Rubino
SIGSOFT
2007
ACM
16 years 5 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
BMCBI
2007
152views more  BMCBI 2007»
15 years 5 months ago
PASSIM - an open source software system for managing information in biomedical studies
Background: One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical s...
Juris Viksna, Edgars Celms, Martins Opmanis, Karli...