Sciweavers

1007 search results - page 191 / 202
» The Complexity of Futile Questioning
Sort
View
USS
2008
13 years 10 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ATAL
2008
Springer
13 years 9 months ago
Resource limitations, transmission costs and critical thresholds in scale-free networks
Whether or not a critical threshold exists when epidemic diseases are spread in complex networks is a problem attracting attention from researchers in several disciplines. In 2001...
Chung-Yuan Huang, Chuen-Tsai Sun, Chia-Ying Cheng,...
VAMOS
2010
Springer
13 years 9 months ago
Conflict Resolution Strategies During Product Configuration
During product configuration, users are prone to make errors because of complexity and lack of system knowledge. Such errors cause conflicts (i.e., incompatible choices selected) a...
Alexander Nöhrer, Alexander Egyed
ZEUS
2010
153views Communications» more  ZEUS 2010»
13 years 9 months ago
Estimating costs of a service
When designing a publicly available Web service, a service designer has to take care of costs and revenue caused by this services. In the very beginning possible partners might onl...
Christian Gierds, Jan Sürmeli
PTS
2007
120views Hardware» more  PTS 2007»
13 years 9 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König