Sciweavers

14649 search results - page 2834 / 2930
» Principles of problem solving
Sort
View
VIZSEC
2005
Springer
15 years 10 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 10 months ago
iMeMex: Escapes from the Personal Information Jungle
Modern computer work stations provide thousands of applications that store data in >100.000 files on the file system of the underlying OS. To handle these files data process...
Jens-Peter Dittrich, Marcos Antonio Vaz Salles, Do...
VLDB
2005
ACM
105views Database» more  VLDB 2005»
15 years 10 months ago
Light-weight Domain-based Form Assistant: Querying Web Databases On the Fly
The Web has been rapidly “deepened” by myriad searchable databases online, where data are hidden behind query forms. Helping users query alternative “deep Web” sources in ...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
ASPLOS
2004
ACM
15 years 10 months ago
HOIST: a system for automatically deriving static analyzers for embedded systems
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-constrained platforms, and being developed rapidly. Static program analysi...
John Regehr, Alastair Reid
CASES
2004
ACM
15 years 10 months ago
Balancing design options with Sherpa
Application specific processors offer the potential of rapidly designed logic specifically constructed to meet the performance and area demands of the task at hand. Recently, t...
Timothy Sherwood, Mark Oskin, Brad Calder
« Prev « First page 2834 / 2930 Last » Next »