Sciweavers

716 search results - page 130 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
EUROSYS
2007
ACM
14 years 4 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...
CIKM
2006
Springer
13 years 11 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
UML
2005
Springer
14 years 1 months ago
Reliability Prediction in Model-Driven Development
Abstract. Evaluating the implications of an architecture design early in the software development lifecycle is important in order to reduce costs of development. Reliability is an ...
Genaína Nunes Rodrigues, David S. Rosenblum...
SSDBM
1999
IEEE
118views Database» more  SSDBM 1999»
13 years 12 months ago
Evaluation of Ad Hoc OLAP: In-Place Computation
Large scale data analysis and mining activities, such as identifying interesting trends, making unusual patterns to stand out and verifying hypotheses, require sophisticated infor...
Damianos Chatziantoniou