Sciweavers

2478 search results - page 254 / 496
» Message from the Chair
Sort
View
127
Voted
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 11 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
102
Voted
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 11 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
IEEESCC
2008
IEEE
15 years 11 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
136
Voted
CSFW
2007
IEEE
15 years 11 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
121
Voted
IEEESCC
2007
IEEE
15 years 11 months ago
Governance of Cross-Organizational Service Agreements: A Policy-Based Approach
Many real-life organizations are hierarchies of largely autonomous, heterogeneous members (individuals or other organizations), often exhibiting rich policies. We restrict our att...
Yathiraj B. Udupi, Munindar P. Singh