Sciweavers

1994 search results - page 279 / 399
» Limited Software Warranties
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
IPPS
2006
IEEE
14 years 3 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
ISCC
2006
IEEE
166views Communications» more  ISCC 2006»
14 years 3 months ago
Integration of Embedded Devices Through Web Services: Requirements, Challenges and Early Results
Integration of the currently available computing systems and platforms is one of the most envisaged goals achieved by computer scientists, which starts to become a reality nowaday...
Guilherme Bertoni Machado, Frank Siqueira, Robinso...
SBACPAD
2006
IEEE
102views Hardware» more  SBACPAD 2006»
14 years 3 months ago
Ultra-Fast CPU Performance Prediction: Extending the Monte Carlo Approach
Performance evaluation of contemporary processors is becoming increasingly difficult due to the lack of proper frameworks. Traditionally, cycle-accurate simulators have been exte...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
VL
2006
IEEE
106views Visual Languages» more  VL 2006»
14 years 3 months ago
Relo: Helping Users Manage Context during Interactive Exploratory Visualization of Large Codebases
As software systems grow in size and use more third-party libraries and frameworks, the need for developers to understand unfamiliar large codebases is rapidly increasing. In this...
Vineet Sinha, David R. Karger, Rob Miller