Sciweavers

62 search results - page 6 / 13
» Toward a Taxonomy and Costing Method for Security Services
Sort
View
COMPSAC
2009
IEEE
14 years 2 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ICDE
2012
IEEE
204views Database» more  ICDE 2012»
11 years 10 months ago
Towards Multi-tenant Performance SLOs
—As traditional and mission-critical relational database workloads migrate to the cloud in the form of Databaseas-a-Service (DaaS), there is an increasing motivation to provide p...
Willis Lang, Srinath Shankar, Jignesh M. Patel, Aj...
ICDCS
2002
IEEE
14 years 19 days ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
IWFM
2003
13 years 9 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
UIALL
2004
Springer
14 years 1 months ago
A Framework for Context-Sensitive Coordination of Human Interruptions in Human-Computer Interaction
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
Sonja Gievska, John L. Sibert