Sciweavers

3104 search results - page 302 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
CC
2011
Springer
270views System Software» more  CC 2011»
14 years 8 months ago
Subregion Analysis and Bounds Check Elimination for High Level Arrays
For decades, the design and implementation of arrays in programming languages has reflected a natural tension between productivity and performance. Recently introduced HPCS langua...
Mackale Joyner, Zoran Budimlic, Vivek Sarkar
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 5 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
FGIT
2009
Springer
15 years 11 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
ENVSOFT
2008
120views more  ENVSOFT 2008»
15 years 5 months ago
Extension and evaluation of sensitivity analysis capabilities in a photochemical model
The decoupled direct method in three dimensions (DDM-3D) provides an efficient and accurate approach for probing the sensitivity of atmospheric pollutant concentrations to various...
S. L. Napelenok, D. S. Cohan, M. T. Odman, S. Tons...
ATAL
2004
Springer
15 years 10 months ago
An Empirical Study of the Effect of Agent Competence on User Performance and Perception
We studied the role of the competence of an interface agent that helped users to learn and use a text editor. Participants in the study made a set of changes to a document with th...
Jun Xiao, John T. Stasko, Richard Catrambone