Sciweavers

458 search results - page 76 / 92
» Designing and executing protocols using the event calculus
Sort
View
RAID
1999
Springer
13 years 12 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
SOFTVIS
2010
ACM
13 years 7 months ago
AllocRay: memory allocation visualization for unmanaged languages
A programs memory system performance is one of the key determinants of its overall performance. Lack of understanding of a programs memory system behavior can lead to performance ...
George G. Robertson, Trishul M. Chilimbi, Bongshin...
CIKM
2008
Springer
13 years 9 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
USITS
1997
13 years 9 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
PADL
2009
Springer
14 years 8 months ago
Operational Semantics for Declarative Networking
Declarative Networking has been recently promoted as a high-level programming paradigm to more conveniently describe and implement systems that run in a distributed fashion over a ...
Juan A. Navarro, Andrey Rybalchenko