Sciweavers

1580 search results - page 278 / 316
» Non-Interference Through Determinism
Sort
View
SIGMETRICS
2003
ACM
14 years 3 months ago
Queueing systems with long-range dependent input process and subexponential service times
We analyze the asymptotic tail distribution of stationary waiting times and stationary virtual waiting times in a singleserver queue with long-range dependent arrival process and ...
Cathy H. Xia, Zhen Liu
XMLSEC
2003
ACM
14 years 3 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
CCS
2003
ACM
14 years 3 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
ISMIR
2003
Springer
133views Music» more  ISMIR 2003»
14 years 3 months ago
Chord segmentation and recognition using EM-trained hidden markov models
Automatic extraction of content description from commercial audio recordings has a number of important applications, from indexing and retrieval through to novel musicological ana...
Alexander Sheh, Daniel P. W. Ellis
ISCA
2010
IEEE
240views Hardware» more  ISCA 2010»
14 years 3 months ago
Modeling critical sections in Amdahl's law and its implications for multicore design
This paper presents a fundamental law for parallel performance: it shows that parallel performance is not only limited by sequential code (as suggested by Amdahl’s law) but is a...
Stijn Eyerman, Lieven Eeckhout