Sciweavers

1147 search results - page 147 / 230
» Termination in language-based systems
Sort
View
104
Voted
ESWS
2004
Springer
15 years 6 months ago
Publish/Subscribe for RDF-based P2P Networks
Publish/subscribe systems are an alternative to query based systems in cases where the same information is asked for over and over, and where clients want to get updated answers fo...
Paul-Alexandru Chirita, Stratos Idreos, Manolis Ko...
87
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 1 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
85
Voted
ACSAC
2003
IEEE
15 years 6 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
DSN
2003
IEEE
15 years 6 months ago
From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and Benefits
Many fault-tolerant group communication middleware systems have been implemented assuming crash failure semantics. While this assumption is not unreasonable, it becomes hard to ju...
Dimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Spe...
97
Voted
MOBISYS
2007
ACM
16 years 8 days ago
Energy-efficient multi-hop medical sensor networking
Abstract-- Wireless sensor networks represent a key technology enabler for enhanced health care and assisted living systems. Recent standardization efforts to ensure compatibility ...
Antonio G. Ruzzelli, Raja Jurdak, Gregory M. P. O'...