Sciweavers

3155 search results - page 203 / 631
» How Are You Doing
Sort
View
APSEC
2005
IEEE
14 years 2 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
NDSS
2005
IEEE
14 years 2 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
SIGCPR
2003
ACM
106views Hardware» more  SIGCPR 2003»
14 years 2 months ago
Triple jeopardy: race, gender and class politics of women in technology
In this paper, I consider how class, race, and gender influence perspectives regarding information technology (IT). I do so by considering how participants in a community technolo...
Lynette Kvasny
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm
ISSRE
2002
IEEE
14 years 2 months ago
The Impact of Recovery Mechanisms on the Likelihood of Saving Corrupted State
Recovery systems must save state before a failure occurs to enable the system to recover from the failure. However, recovery will fail if the recovery system saves any state corru...
Subhachandra Chandra, Peter M. Chen