Sciweavers

5838 search results - page 1143 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
132
Voted
CCS
2006
ACM
15 years 6 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
FOCS
2004
IEEE
15 years 6 months ago
Tolls for Heterogeneous Selfish Users in Multicommodity Networks and Generalized Congestion Games
We prove the existence of tolls to induce multicommodity, heterogeneous network users that independently choose routes minimizing their own linear function of tolls versus latency...
Lisa Fleischer, Kamal Jain, Mohammad Mahdian
116
Voted
AAAI
2007
15 years 5 months ago
A Modal Logic for Beliefs and Pro Attitudes
Agents’ pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural an...
Kaile Su, Abdul Sattar, Han Lin, Mark Reynolds
112
Voted
ANCS
2008
ACM
15 years 4 months ago
A remotely accessible network processor-based router for network experimentation
Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packe...
Charlie Wiseman, Jonathan S. Turner, Michela Becch...
132
Voted
CF
2005
ACM
15 years 4 months ago
Evaluation of extended dictionary-based static code compression schemes
This paper evaluates how much extended dictionary-based code compression techniques can reduce the static code size. In their simplest form, such methods statically identify ident...
Martin Thuresson, Per Stenström
« Prev « First page 1143 / 1168 Last » Next »