Sciweavers

8278 search results - page 1524 / 1656
» Context-Aware Process Networks
Sort
View
TELSYS
2010
140views more  TELSYS 2010»
13 years 4 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TON
2010
139views more  TON 2010»
13 years 4 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
TWC
2010
13 years 4 months ago
Coordinated beamforming for the multicell multi-antenna wireless system
In a conventional wireless cellular system, signal processing is performed on a per-cell basis; out-of-cell interference is treated as background noise. This paper considers the be...
Hayssam Dahrouj, Wei Yu
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 1 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
ICDE
2011
IEEE
274views Database» more  ICDE 2011»
13 years 1 months ago
SQPR: Stream query planning with reuse
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...
Evangelia Kalyvianaki, Wolfram Wiesemann, Quang Hi...
« Prev « First page 1524 / 1656 Last » Next »