Sciweavers

12084 search results - page 134 / 2417
» Effect Systems with Subtyping
Sort
View
ICDCSW
2002
IEEE
14 years 2 months ago
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing
Time-driven Key Sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively lo...
Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Lev...
AINA
2010
IEEE
14 years 2 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
CHI
1998
ACM
14 years 1 months ago
Effects of Awareness Support on Groupware Usability
Collaboration in current real-time groupware systems is often an awkward and clumsy process. We hypothesize that better support for workspace awareness can improve the usability o...
Carl Gutwin, Saul Greenberg
AWIC
2004
Springer
14 years 1 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
CC
2001
Springer
14 years 27 days ago
Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries
Large programs are typically built from separate modules. Traditional whole-program analysis cannot be used in the context of such modular development. In this paper we consider an...
Atanas Rountev, Barbara G. Ryder