Sciweavers

2747 search results - page 494 / 550
» Network externalities in software systems
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
ATAL
2005
Springer
14 years 2 months ago
Progressive ontology alignment for meaning coordination: an information-theoretic foundation
We elaborate on the mathematical foundations of the meaning coordination problem that agents face in open environments. We investigate to which extend the BarwiseSeligman theory o...
W. Marco Schorlemmer, Yannis Kalfoglou
ICCS
2004
Springer
14 years 2 months ago
Using Runtime Measurements and Historical Traces for Acquiring Knowledge in Parallel Applications
Abstract. A new approach for acquiring knowledge of parallel applications regarding resource usage and for searching similarity on workload traces is presented. The main goal is to...
Luciano José Senger, Marcos José San...
ICFEM
2004
Springer
14 years 2 months ago
Linear Inequality LTL (iLTL): A Model Checker for Discrete Time Markov Chains
Abstract. We develop a way of analyzing the behavior of systems modeled using Discrete Time Markov Chains (DTMC). Specifically, we define iLTL, an LTL with linear inequalities on...
YoungMin Kwon, Gul Agha
FTDCS
2003
IEEE
14 years 2 months ago
Dynamic Component Composition for Functionality Adaptation in Pervasive Environments
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....