Sciweavers

45 search results - page 6 / 9
» Getting the Picture
Sort
View
COCOON
2007
Springer
14 years 10 days ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
ENTCS
2008
108views more  ENTCS 2008»
13 years 8 months ago
Modelling Dynamic Software Architectures using Typed Graph Grammars
Several recent research efforts have focused on the dynamic aspects of software architectures providing suitable models and techniques for handling the run-time modification of th...
Roberto Bruni, Antonio Bucchiarone, Stefania Gnesi...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
VIZSEC
2005
Springer
14 years 1 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
CTW
2006
112views more  CTW 2006»
13 years 8 months ago
Cross border railway operations: improving safety at cultural interfaces
Organizations with different cultures will be increasingly required to interface with each other as legislation is introduced to ensure the interoperability of railway systems acr...
S. O. Johnsen, J. Vatn, R. Rosness, I. A. Herrera