Sciweavers

995 search results - page 193 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
ICN
2009
Springer
14 years 1 months ago
Measuring Route Diversity in the Internet from Remote Vantage Points
Recent works on modeling the Internet topology [8, 9] have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sac...
Andrea Di Menna, Tiziana Refice, Luca Cittadini, G...
COLCOM
2008
IEEE
14 years 1 months ago
Data Quality and Failures Characterization of Sensing Data in Environmental Applications
Environmental monitoring is one of the most important sensor network application domains. The success of those applications is determined by the quality of the collected data. Thu...
Kewei Sha, Guoxing Zhan, Safwan Al-Omari, Tim Cala...
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
ISSAC
2007
Springer
177views Mathematics» more  ISSAC 2007»
14 years 1 months ago
Component-level parallelization of triangular decompositions
We discuss the parallelization of algorithms for solving polynomial systems symbolically by way of triangular decompositions. We introduce a component-level parallelism for which ...
Marc Moreno Maza, Yuzhen Xie
MSR
2006
ACM
14 years 1 months ago
TA-RE: an exchange language for mining software repositories
Software repositories have been getting a lot of attention from researchers in recent years. In order to analyze software repositories, it is necessary to first extract raw data f...
Sunghun Kim, Thomas Zimmermann, Miryung Kim, Ahmed...