Sciweavers

706 search results - page 133 / 142
» Clone-Aware Configuration Management
Sort
View
HICSS
2002
IEEE
111views Biometrics» more  HICSS 2002»
14 years 3 months ago
Intelligent Workflow Techniques for Distributed Group Facilitation
Distributed group facilitation techniques are becoming a necessity because many of the face-toface facilitation techniques are no longer suitable in a distributed environment. Alt...
Jay F. Nunamaker, J. Leon Zhao, Robert O. Briggs
RAID
2001
Springer
14 years 2 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
CAISE
2000
Springer
14 years 2 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
14 years 2 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
HOTOS
1999
IEEE
14 years 2 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...