Sciweavers

366 search results - page 67 / 74
» Fremont: A System for Discovering Network Characteristics an...
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
IJCAI
1993
13 years 9 months ago
An Approach to Analyzing the Need for Meta-Level Communication
This paper presents an analysis of static and dynamic organizational structures for naturally distributed, homogeneous, cooperative problem solving environments, exemplified by di...
Keith Decker, Victor R. Lesser
ATAL
2008
Springer
13 years 9 months ago
Engineering large-scale distributed auctions
The functional characteristics of market-based solutions are typically best observed through the medium of simulation, data-gathering and subsequent visualization. We previously d...
Peter Gradwell, Michel A. Oey, Reinier J. Timmer, ...
DSN
2006
IEEE
13 years 11 months ago
A Contribution Towards Solving the Web Workload Puzzle
World Wide Web, the biggest distributed system ever built, experiences tremendous growth and change in Web sites, users, and technology. A realistic and accurate characterization ...
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wan...
ISCAS
1994
IEEE
92views Hardware» more  ISCAS 1994»
13 years 11 months ago
A Study on the Stochastic Computation Using the Ratio of One Pulses and Zero Pulses
Stochastic computation uses pulse streams to represent numbers. In this paper, we have studied the novel method to implement the number system which uses the ratio of the number o...
Seung-Jai Min, Eel-Wan Lee, Soo-Ik Chae