Sciweavers

2030 search results - page 122 / 406
» The Need for Customizable Operating Systems
Sort
View
ESORICS
2006
Springer
15 years 8 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
CTW
2002
91views more  CTW 2002»
15 years 4 months ago
Can We Ever Escape from Data Overload? A Cognitive Systems Diagnosis
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
David D. Woods, Emily S. Patterson, Emilie M. Roth
STANDARDVIEW
1998
71views more  STANDARDVIEW 1998»
15 years 4 months ago
Network externalities in software systems
Network externalities are the effects on the value of a product that can be ascribed to the presence of a network of users of such product. They play an essential role in the busi...
Giancarlo Succi, Paolo Predonzani, Andrea Valerio,...
TLDI
2005
ACM
102views Formal Methods» more  TLDI 2005»
15 years 10 months ago
An open and shut typecase
Two different ways of defining ad-hoc polymorphic operations commonly occur in programming languages. With the first form polymorphic operations are defined inductively on the...
Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie...
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
15 years 11 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl