Sciweavers

7124 search results - page 1071 / 1425
» Programming Languages and Operating Systems
Sort
View
EICS
2009
ACM
15 years 11 months ago
A bisimulation-based approach to the analysis of human-computer interaction
This paper discusses the use of formal methods for analysing human-computer interaction. We focus on the mode confusion problem that arises whenever the user thinks that the syste...
Sébastien Combéfis, Charles Pecheur
CCS
2003
ACM
15 years 10 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
SSDBM
1999
IEEE
113views Database» more  SSDBM 1999»
15 years 9 months ago
Multidimensional Indexing and Query Coordination for Tertiary Storage Management
In many scientific domains, experimental devices or simulation programs generate large volumes of data. The volumes of data may reach hundreds of terabytes and therefore it is imp...
Arie Shoshani, Luis M. Bernardo, Henrik Nordberg, ...
PERCOM
2007
ACM
16 years 4 months ago
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario
Due to the inherent nature of their heterogeneity, resource scarcity and dynamism, the provision of middleware for future networked embedded environments is a challenging task. In...
Paolo Costa, Geoff Coulson, Richard Gold, Manish L...
MINENET
2006
ACM
15 years 10 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
« Prev « First page 1071 / 1425 Last » Next »