Sciweavers

1532 search results - page 265 / 307
» An analysis of additivity in OLAP systems
Sort
View
SASN
2004
ACM
14 years 1 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
SEMWEB
2004
Springer
14 years 1 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
ICAIL
2003
ACM
14 years 1 months ago
Specifying and Reasoning with Institutional Agents
This paper proposes a logic-oriented framework for institutional agents specification and analysis. Within this framework institutional agents are seen as artificial agents that a...
Filipe Santos, Olga Pacheco
PLDI
2003
ACM
14 years 1 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
CCS
2003
ACM
14 years 29 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson