Sciweavers

217 search results - page 40 / 44
» Modeling a distributed intrusion detection system using coll...
Sort
View
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 11 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
HASKELL
2008
ACM
13 years 8 months ago
Haskell: batteries included
The quality of a programming language itself is only one component in the ability of application writers to get the job done. Programming languages can succeed or fail based on th...
Duncan Coutts, Isaac Potoczny-Jones, Don Stewart
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
MOBISYS
2008
ACM
14 years 7 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
SAC
2008
ACM
13 years 7 months ago
Towards a model-driven engineering approach for developing embedded hard real-time software
Model-Driven Engineering (MDE) has been advocated as an effective way to deal with today's software complexity. MDE can be seen as an integrative approach combining existing ...
Fabiano Cruz, Raimundo S. Barreto, Lucas Cordeiro