Sciweavers

1407 search results - page 184 / 282
» Systems Theory Model for Information Security
Sort
View
128
Voted
WSC
2007
15 years 6 months ago
Implications of heavy tails on simulation-based ordinal optimization
We consider the problem of selecting the best system using simulation-based ordinal optimization. This problem has been studied mostly in the context of light-tailed distributions...
Mark Broadie, Minsup Han, Assaf Zeevi
HOTOS
2007
IEEE
15 years 8 months ago
Processor Hardware Counter Statistics as a First-Class System Resource
Today's processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (...
Xiao Zhang, Sandhya Dwarkadas, Girts Folkmanis, Ka...
SAC
2004
ACM
15 years 9 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
161
Voted
IAT
2007
IEEE
15 years 10 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
AAAIDEA
2005
IEEE
15 years 10 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings