Sciweavers

2838 search results - page 356 / 568
» Verifying Controlled Components
Sort
View
125
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 7 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
124
Voted
TSP
2010
14 years 7 months ago
Multichannel fast QR-decomposition algorithms: weight extraction method and its applications
Abstract--Multichannel fast QR decomposition RLS (MCFQRD-RLS) algorithms are well known for their good numerical properties and low computational complexity. The main limitation is...
Mobien Shoaib, Stefan Werner, José Antonio ...
99
Voted
CHI
2011
ACM
14 years 4 months ago
How a freeform spatial interface supports simple problem solving tasks
We developed DataBoard, a freeform spatial interface, to support users in simple problem solving tasks. To develop a deeper understanding of the role of space and the tradeoffs be...
Eser Kandogan, Juho Kim, Thomas P. Moran, Pablo Pe...
123
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
A theory of cloud bandwidth pricing for video-on-demand providers
—Current-generation cloud computing is offered with usage-based pricing, with no bandwidth capacity guarantees, which is however unappealing to bandwidth-intensive applications s...
Di Niu, Chen Feng, Baochun Li
EUROSYS
2008
ACM
15 years 9 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler