Sciweavers

1134 search results - page 184 / 227
» On Scalability and Modularisation in the Modelling of Networ...
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
VLSID
2006
IEEE
192views VLSI» more  VLSID 2006»
14 years 1 months ago
Beyond RTL: Advanced Digital System Design
This tutorial focuses on advanced techniques to cope with the complexity of designing modern digital chips which are complete systems often containing multiple processors, complex...
Shiv Tasker, Rishiyur S. Nikhil
SACMAT
2009
ACM
14 years 2 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
TPDS
2008
130views more  TPDS 2008»
13 years 7 months ago
NFS-CD: Write-Enabled Cooperative Caching in NFS
We present the Network File System with Cluster Delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems ...
Alexandros Batsakis, Randal C. Burns
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
14 years 1 months ago
COSMOS: Peer-to-Peer Collaborative Streaming Among Mobiles
In traditional mobile streaming networks such as 3G cellular networks, all users pull streams from a server. Such pull model leads to high streaming cost and problem in system sca...
Man-Fung Leung, Shueng-Han Gary Chan, Oscar C. Au