Sciweavers

300 search results - page 21 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
14 years 10 months ago
A Sampling-Based Approach to Information Recovery
There has been a recent resurgence of interest in research on noisy and incomplete data. Many applications require information to be recovered from such data. For example, in sens...
Junyi Xie, Jun Yang 0001, Yuguo Chen, Haixun Wang,...
ICSOC
2007
Springer
14 years 2 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...
FIRSTMONDAY
2006
70views more  FIRSTMONDAY 2006»
13 years 8 months ago
Beyond binary choices: Understanding and exploiting trade-offs to enhance creativity
Many research approaches are conceptualized as binary choices, representing endpoints of a spectrum (each of them providing important perspectives within their own discourses). Des...
Gerhard Fischer
ACSAC
2003
IEEE
14 years 1 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford