Sciweavers

19 search results - page 3 / 4
» Sequential and Parallel Attack Tree Modelling
Sort
View
ICDE
1999
IEEE
113views Database» more  ICDE 1999»
15 years 6 days ago
Parallel Algorithms for Computing Temporal Aggregates
The ability to model the temporal dimension is essential to many applications. Furthermore, the rate of increase in database size and response time requirements has outpaced advan...
Jose Alvin G. Gendrano, Bruce C. Huang, Jim M. Rod...
ASPLOS
2010
ACM
14 years 2 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
CONCUR
2008
Springer
14 years 19 days ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
WSC
2008
14 years 1 months ago
The improved sweep metaheuristic for simulation optimization and application to job shop scheduling
We present an improved sweep metaheuristic for discrete event simulation optimization. The sweep algorithm is a tree search similar to beam search. The basic idea is to run a limi...
George Jiri Mejtsky
CW
2002
IEEE
14 years 3 months ago
Adaptive Content Model for Multimedia Presentation
Multimedia presentation systems require flexible support for the modeling of multimedia content models. Many presentation systems provide the synchronized, sequential or concurren...
L. Y. Deng, R.-X. Chen, R.-C. Chang, T.-S. Huang