Sciweavers

851 search results - page 151 / 171
» A View on Components
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
SIGCOMM
2009
ACM
14 years 1 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ICSM
2007
IEEE
14 years 1 months ago
Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach
Recent software systems usually feature an automated failure reporting component, with which a huge number of failures are collected from software end-users. With a proper support...
Xiangyu Zhang Chao Liu, Yu Zhang, Jiawei Han, Bhar...
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
14 years 1 months ago
Prediction method to maintain QoS in weather impacted wireless and satellite networks
—Rain and snow can have a distorting effect on Ku and Ka bands signal fidelity resulting in excessive digital transmission errors. This loss of signal attenuation is commonly ref...
Kamal Harb, Anand Srinivasan, Changcheng Huang, Br...
APPROX
2007
Springer
100views Algorithms» more  APPROX 2007»
14 years 28 days ago
Implementing Huge Sparse Random Graphs
Consider a scenario where one desires to simulate the execution of some graph algorithm on random input graphs of huge, perhaps even exponential size. Sampling and storing these h...
Moni Naor, Asaf Nussboim