Sciweavers

1318 search results - page 235 / 264
» Measuring network security using dynamic bayesian network
Sort
View
CCS
2006
ACM
13 years 11 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
JUCS
2010
164views more  JUCS 2010»
13 years 6 months ago
On Sustainability of Context-Aware Services Among Heterogeneous Smart Spaces
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
Jason J. Jung
NSDI
2004
13 years 9 months ago
SWAP: A Scheduler with Automatic Process Dependency Detection
We have developed SWAP, a system that automatically detects process dependencies and accounts for such dependencies in scheduling. SWAP uses system call history to determine possi...
Haoqiang Zheng, Jason Nieh
TWC
2010
13 years 2 months ago
A framework for statistical wireless spectrum occupancy modeling
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...