Sciweavers

747 search results - page 59 / 150
» Testing for tunneling opens
Sort
View
LADS
2009
Springer
14 years 2 months ago
Detecting Exceptions in Commitment Protocols: Discovering Hidden States
—Open multiagent systems consist of autonomous agents that are built by different vendors. In principle, open multiagent systems cannot provide any guarantees about the behaviors...
Özgür Kafali, Pinar Yolum
ACSAC
2010
IEEE
13 years 7 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 7 months ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco
WISE
2002
Springer
14 years 2 months ago
Querying Web Data - The WebQA Approach
The common paradigm of searching and retrieving information on the Web is based on keyword-based search using one or more search engines, and then browsing through the large numbe...
Sunny K. S. Lam, M. Tamer Özsu
DIMVA
2006
13 years 11 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...