Sciweavers

13137 search results - page 2589 / 2628
» A Science of Software Design
Sort
View
107
Voted
ICDCS
2010
IEEE
15 years 6 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
148
Voted
CIKM
2004
Springer
15 years 6 months ago
Energy management schemes for memory-resident database systems
With the tremendous growth of system memories, memoryresident databases are increasingly becoming important in various domains. Newer memories provide a structured way of storing ...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
116
Voted
CCS
2006
ACM
15 years 6 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
131
Voted
CCS
2006
ACM
15 years 6 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
118
Voted
CLEF
2006
Springer
15 years 6 months ago
CLEF 2006: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2006 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual, and multilingual...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
« Prev « First page 2589 / 2628 Last » Next »