Sciweavers

1693 search results - page 274 / 339
» Pattern-Recognition: a Foundational Approach
Sort
View
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 8 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
CCGRID
2004
IEEE
15 years 8 months ago
OGSI.NET: OGSI-compliance on the .NET framework
: The Open Grid Service Infrastructure (OGSI) has been designed to facilitate the creation of multiple, interoperable Grid Service hosting environments, but to date only one fully ...
Glenn S. Wasson, Norm Beekwilder, Mark M. Morgan, ...
EDOC
2004
IEEE
15 years 8 months ago
A Logical Viewpoint on Architectures
In this paper we introduce a logical viewpoint on architectures. The logical viewpoint is based on the distinction between symbolic and semantic models of architectures. The core ...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
EDBTW
2006
Springer
15 years 8 months ago
Dynamic Plan Migration for Snapshot-Equivalent Continuous Queries in Data Stream Systems
A data stream management system executes a large number of continuous queries in parallel. As stream characteristics and query workload change over time, the plan initially install...
Jürgen Krämer, Yin Yang, Michael Cammert...
ESORICS
2006
Springer
15 years 8 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...