Sciweavers

9162 search results - page 1582 / 1833
» System and User Data Complexity
Sort
View
124
Voted
CN
2007
106views more  CN 2007»
15 years 4 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
DEBU
2000
101views more  DEBU 2000»
15 years 3 months ago
Learning to Understand the Web
In a traditional information retrieval system, it is assumed that queries can be posed about any topic. In reality, a large fraction of web queries are posed about a relatively sm...
William W. Cohen, Andrew McCallum, Dallan Quass
OOPSLA
2010
Springer
15 years 2 months ago
Instrumentation and sampling strategies for cooperative concurrency bug isolation
Fixing concurrency bugs (or crugs) is critical in modern software systems. Static analyses to find crugs such as data races and atomicity violations scale poorly, while dynamic a...
Guoliang Jin, Aditya V. Thakur, Ben Liblit, Shan L...
155
Voted
WCNC
2010
IEEE
15 years 2 months ago
Combining Parallel Sequence Spread Spectrum (PSSS) with OFDM - Concept and Simulation Results
—In this paper, we present a novel multi-carrier spread spectrum (MCSS) system which uses Parallel Sequence Spread Spectrum (PSSS) as its spreading transform. This technique call...
Paulo Isagani M. Urriza, Joel Joseph S. Marciano J...
141
Voted
IPPS
2010
IEEE
15 years 1 months ago
Dynamic analysis of the relay cache-coherence protocol for distributed transactional memory
Transactional memory is an alternative programming model for managing contention in accessing shared in-memory data objects. Distributed transactional memory (TM) promises to alle...
Bo Zhang, Binoy Ravindran
« Prev « First page 1582 / 1833 Last » Next »