Sciweavers

6229 search results - page 1021 / 1246
» Models of Computation for Networks on Chip
Sort
View
JCP
2006
100views more  JCP 2006»
13 years 10 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
RAID
2007
Springer
14 years 4 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ISORC
2006
IEEE
14 years 4 months ago
RTSTREAM: Real-Time Query Processing for Data Streams
Many real-time applications, such as traffic control systems, surveillance systems and health monitoring systems, need to operate on continuous unbounded streams of data. These ap...
Yuan Wei, Sang Hyuk Son, John A. Stankovic
CCS
2004
ACM
14 years 4 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
JAIR
2000
105views more  JAIR 2000»
13 years 10 months ago
Reasoning on Interval and Point-based Disjunctive Metric Constraints in Temporal Contexts
We introduce a temporal model for reasoning on disjunctive metric constraints on intervals and time points in temporal contexts. This temporal model is composed of a labeled tempo...
Federico Barber
« Prev « First page 1021 / 1246 Last » Next »