Sciweavers

242 search results - page 41 / 49
» An information theoretic view of network management
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
CCS
2007
ACM
14 years 1 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
ICDIM
2009
IEEE
14 years 2 months ago
Augmenting the exploration of digital libraries with web-based visualizations
Web-based digital libraries have sped up the process that scholars use to find new, important research papers. Unfortunately, current digital libraries are limited by their inade...
Peter Bergstrom, Darren C. Atkinson
CAISE
2006
Springer
13 years 11 months ago
Community based Ubiquitous System Development in Multi-agent Environment
Ubiquitous system can be considered as the intelligent space, in which many kinds of component are connected by networks and also each component recognizes their connection and coo...
Youna Jung, Jungtae Lee, Minkoo Kim
INFOSCALE
2007
ACM
13 years 9 months ago
BUST: enabling scalable service orchestration
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...
Dong Liu, Ralph Deters