Sciweavers

6279 search results - page 1041 / 1256
» Studies in Solution Sampling
Sort
View
ISSA
2004
15 years 5 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
NETWORKING
2004
15 years 5 months ago
Traffic Grooming in WDM Ring Networks with the Min-Max Objective
We consider the problem of traffic grooming in WDM ring networks. Previous studies have focused on minimizing aggregate representations of the network cost. In this work, we consid...
Bensong Chen, George N. Rouskas, Rudra Dutta
FORTE
2003
15 years 5 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
OPODIS
2004
15 years 5 months ago
Lock-Free and Practical Doubly Linked List-Based Deques Using Single-Word Compare-and-Swap
Abstract. We present an efficient and practical lock-free implementation of a concurrent deque that supports parallelism for disjoint accesses and uses atomic primitives which are ...
Håkan Sundell, Philippas Tsigas
IADIS
2003
15 years 5 months ago
Understanding Expert Search Strategies for Designing User-Friendly Search Interfaces
Web search engines face an extremely heterogeneous user population from web novices to highly skilled experts. Currently, the search strategies of the experienced web searchers ar...
Anne Aula, Mika Käki
« Prev « First page 1041 / 1256 Last » Next »