Sciweavers

1440 search results - page 267 / 288
» Cost-Sharing Mechanisms for Network Design
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
CMS
2006
13 years 9 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
BMCBI
2007
182views more  BMCBI 2007»
13 years 7 months ago
Hybrid elementary flux analysis/nonparametric modeling: application for bioprocess control
Background: The progress in the "-omic" sciences has allowed a deeper knowledge on many biological systems with industrial interest. This knowledge is still rarely used ...
Ana P. Teixeira, Carlos Alves, Paula M. Alves, Man...
CN
2008
100views more  CN 2008»
13 years 7 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CSJM
2007
150views more  CSJM 2007»
13 years 7 months ago
An approach for NL text interpretation
For modeling the interpretation process of NL sentences we use the mechanisms implying semantic networks that assure syntactic – semantic text interpretation (SSI), including an...
Anatol Popescu, Sergiu Cretu