Sciweavers

1925 search results - page 185 / 385
» Dynamic Typing
Sort
View
CCS
1999
ACM
14 years 1 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
COMPSAC
1999
IEEE
14 years 1 months ago
Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates
Design patterns have been used in object-oriented frameworks such as the IBM San Francisco framework, Apple's Rhaspody, OpenStep, and WebObjects, and DIWB. However, few guide...
Wei-Tek Tsai, Yongzhong Tu, Weiguang Shao, Ezra Eb...
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 4 months ago
Dependency-aware reordering for parallelizing query optimization in multi-core CPUs
The state of the art commercial query optimizers employ cost-based optimization and exploit dynamic programming (DP) to ļ¬nd the optimal query execution plan (QEP) without evalua...
Wook-Shin Han, Jinsoo Lee
INFOCOM
2006
IEEE
14 years 3 months ago
Minimum User-Perceived Interference Routing in Service Composition
ā€” Service Composition is a promising technology for providing on-demand services in dynamic and loosely coupled peerto-peer (P2P) networks. Because of system dynamics, such as th...
Li Xiao, Klara Nahrstedt
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...