Sciweavers

20 search results - page 3 / 4
» Automated Upgrades in a Lab Environment
Sort
View
DAC
2001
ACM
14 years 9 months ago
Re-Configurable Computing in Wireless
Wireless communications requires a new approach to implement the algorithms for new standards. The computational demands of these standards are outstripping the ability of traditi...
Bill Salefski, Levent Caglar
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
KBSE
2005
IEEE
14 years 1 months ago
Automating experimentation on distributed testbeds
Engineering distributed systems is a challenging activity. This is partly due to the intrinsic complexity of distributed systems, and partly due to the practical obstacles that de...
Yanyan Wang, Matthew J. Rutherford, Antonio Carzan...
CCS
2003
ACM
14 years 1 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
SEMWEB
2001
Springer
14 years 10 days ago
Brokerage of Intellectual Property Rights in the Semantic Web
New approaches in the Web environment are underway. These new methodologies try to leverage it from an information medium to a knowledgeable level, from a machine point of view. Th...
Roberto García, Jaime Delgado