Sciweavers

645 search results - page 126 / 129
» Pure patterns type systems
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
15 years 5 months ago
Design and Evaluation of Improvement method on the Web Information Navigation - A Stochastic Search Approach
With the advent of fast growing Internet and World Wide Web (WWW), more and more companies start the electronic commerce to enhance the business competitiveness. On the other hand...
Benjamin P.-C. Yen, Y.-W. Wan
138
Voted
VL
2002
IEEE
165views Visual Languages» more  VL 2002»
15 years 4 months ago
Co-Ordination of Multiple External Representations during Java Program Debugging
Java program debugging was investigated in computer science students who used a software debugging environment (SDE) that provided concurrently displayed, adjacent, multiple and l...
Pablo Romero, Rudi Lutz, Richard Cox, Benedict du ...
90
Voted
ISCC
2000
IEEE
156views Communications» more  ISCC 2000»
15 years 4 months ago
Inverse Multiplexing for ATM. Technical Operation, Applications and Performance Evaluation Study
-- In a WAN established infrastructure, one of the main problems ATM network planners and users face, when greater than T1/E1 bandwidth is required, is the high cost associated to ...
Marcos Postigo-Boix, Mónica Aguilar-Igartua...
IPPS
1998
IEEE
15 years 3 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson