Sciweavers

1888 search results - page 350 / 378
» Automatic Implementation of Distributed Systems Formal Speci...
Sort
View
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
129
Voted
CLUSTER
2003
IEEE
15 years 7 months ago
HPCM: A Pre-Compiler Aided Middleware for the Mobility of Legacy Code
Mobility is a fundamental functionality of the next generation internet computing. How to support mobility for legacy codes, however, is still an issue of research. The key to sol...
Cong Du, Xian-He Sun, Kasidit Chanchio
ACISP
1998
Springer
15 years 6 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
DAIS
2003
15 years 3 months ago
Facilitating the Portability of User Applications in Grid Environments
Abstract. Grid computing promises the ability to connect geographically and organizationally distributed resources to increase eective computational power, resource utilization, a...
Paul Z. Kolano
ACL
1998
15 years 3 months ago
Dialogue Act Tagging with Transformation-Based Learning
For the task of recognizing dialogue acts, we are applying the Transformation-Based Learning (TBL) machine learning algorithm. To circumvent a sparse data problem, we extract valu...
Ken Samuel, Sandra Carberry, K. Vijay-Shanker