Sciweavers

2135 search results - page 343 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
ACSAC
2002
IEEE
14 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
ICML
2006
IEEE
14 years 10 months ago
Hidden process models
We introduce Hidden Process Models (HPMs), a class of probabilistic models for multivariate time series data. The design of HPMs has been motivated by the challenges of modeling h...
Rebecca Hutchinson, Tom M. Mitchell, Indrayana Rus...
AINA
2007
IEEE
14 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
LCN
2002
IEEE
14 years 2 months ago
Improving Processor Availability in the MPI Implementation for the ASCI/Red Supercomputer
This paper describes how a portable benchmark suite that measures the ability of an MPI implementation to overlap computation and communication can be used to discover and diagnos...
Ron Brightwell, William Lawry, Arthur B. Maccabe, ...