Sciweavers

1086 search results - page 111 / 218
» Points surrounding the origin
Sort
View
DSN
2002
IEEE
15 years 6 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
84
Voted
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
15 years 6 months ago
Too Much to Carry? Copyright Laws in the Electronic Environment
Digitization of information, the rise of the World Wide Web, and the development of new means for information creation, production and dissemination place new strains on the legal...
Terrence A. Maxwell
CAV
2009
Springer
116views Hardware» more  CAV 2009»
15 years 6 months ago
Priority Scheduling of Distributed Systems Based on Model Checking
Priorities are used to control the execution of systems to meet given requirements for optimal use of resources, e.g., by using scheduling policies. For distributed systems, it is ...
Ananda Basu, Saddek Bensalem, Doron Peled, Joseph ...
GI
2009
Springer
15 years 6 months ago
Taming Selective Strictness
Abstract: Free theorems establish interesting properties of parametrically polymorphic functions, solely from their types, and serve as a nice proof tool. For pure and lazy functio...
Daniel Seidel, Janis Voigtländer
SC
2000
ACM
15 years 5 months ago
Parallel Unsteady Turbo-Pump Simulations For Liquid Rocket Engines
This paper reports the progress being made towards complete turbo-pump simulation capability for liquid rocket engines. The Space Shuttle Main Engine (SSME) turbo-pump impeller is...
Cetin C. Kiris, Dochan Kwak, William Chan