Sciweavers

1541 search results - page 254 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
EUROSYS
2010
ACM
15 years 6 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
UIST
2003
ACM
15 years 5 months ago
Perceptually-supported image editing of text and graphics
This paper presents a novel image editing program emphasizing easy selection and manipulation of material found in informal, casual documentssuch as sketches, handwrittennotes, wh...
Eric Saund, David J. Fleet, Daniel Larner, James M...
124
Voted
LCN
1996
IEEE
15 years 4 months ago
A Class-Chest for Deriving Transport Protocols
Development of new transport protocols or protocol algorithms suffers from the complexity of the envir onment in which they ar e intended to run. Modeling techniques attempt to av...
W. Timothy Strayer
95
Voted
DSN
2005
IEEE
15 years 6 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
CCR
2004
79views more  CCR 2004»
15 years 11 days ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...