Sciweavers

7766 search results - page 1288 / 1554
» Testing Nondeterminate Systems
Sort
View
91
Voted
RAID
2005
Springer
15 years 6 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
104
Voted
SAMOS
2005
Springer
15 years 6 months ago
Modeling NoC Architectures by Means of Deterministic and Stochastic Petri Nets
The design of appropriate communication architectures for complex Systems-on-Chip (SoC) is a challenging task. One promising alternative to solve these problems are Networks-on-Chi...
Holger Blume, Thorsten von Sydow, Daniel Becker, T...
TCGOV
2005
Springer
15 years 6 months ago
UNICAP: Efficient Decision Support for Academic Resource and Capacity Management
Growing complexity of the data and processes to be managed, as well as the transition from strict governmental regulation towards autonomy make academic institutions a significant ...
Svetlana Vinnik, Marc H. Scholl
103
Voted
VLDB
2005
ACM
83views Database» more  VLDB 2005»
15 years 6 months ago
Indexing Data-oriented Overlay Networks
The application of structured overlay networks to implement index structures for data-oriented applications such as peer-to-peer databases or peer-to-peer information retrieval, r...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth, R...
126
Voted
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 6 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
« Prev « First page 1288 / 1554 Last » Next »