Sciweavers

341 search results - page 22 / 69
» A Security Engineering Process based on Patterns
Sort
View
WWW
2010
ACM
15 years 9 months ago
A pattern tree-based approach to learning URL normalization rules
Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. URL normalization is to transform duplicate URLs...
Tao Lei, Rui Cai, Jiang-Ming Yang, Yan Ke, Xiaodon...
113
Voted
EUROPAR
2006
Springer
15 years 6 months ago
Model-Based Performance Diagnosis of Master-Worker Parallel Computations
Parallel performance tuning naturally involves a diagnosis process to locate and explain sources of program inefficiency. Proposed is an approach that exploits parallel computation...
Li Li, Allen D. Malony
SENSYS
2010
ACM
15 years 10 days ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
99
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
KES
2004
Springer
15 years 7 months ago
Ontological Representations of Software Patterns
This paper1 is based on and advocates the trend in software engineering of extending the use of software patterns as means of structuring solutions to software development problems...
Jean-Marc Rosengard, Marian Florin Ursu