Sciweavers

741 search results - page 114 / 149
» Tools and techniques for Network Forensics
Sort
View
IAT
2003
IEEE
14 years 2 months ago
Problem-solving in open environments
With the increasing use of the internet, many problemsolving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involvi...
Santiago Macho-Gonzalez, Boi Faltings
ICDE
2002
IEEE
161views Database» more  ICDE 2002»
14 years 10 months ago
Design and Implementation of a High-Performance Distributed Web Crawler
Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may...
Vladislav Shkapenyuk, Torsten Suel
PERCOM
2007
ACM
14 years 8 months ago
XCML: A Runtime Representation for the Context Modelling Language
The Context Modelling Language (CML), derived from Object Role Modeling (ORM), is a powerful approach for capturing the pertinent object types and relationships between those type...
Ricky Robinson, Karen Henricksen, Jadwiga Indulska
MOBISYS
2004
ACM
14 years 8 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
DSN
2009
IEEE
14 years 3 months ago
Fitness-guided path exploration in dynamic symbolic execution
Dynamic symbolic execution is a structural testing technique that systematically explores feasible paths of the program under test by running the program with different test input...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...