Sciweavers

1022 search results - page 128 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
EUROSYS
2009
ACM
14 years 6 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
ISCA
2007
IEEE
111views Hardware» more  ISCA 2007»
14 years 3 months ago
Express virtual channels: towards the ideal interconnection fabric
Due to wire delay scalability and bandwidth limitations inherent in shared buses and dedicated links, packet-switched on-chip interconnection networks are fast emerging as the per...
Amit Kumar 0002, Li-Shiuan Peh, Partha Kundu, Nira...
ICAIL
2003
ACM
14 years 2 months ago
Developing Legal Knowledge Based Systems Through Theory Construction
Bench-Capon and Sartor have proposed that reasoning with legal cases be seen as a process of theory construction, evaluation and application. They have proposed a set of theory co...
Alison Chorley, Trevor J. M. Bench-Capon
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 3 months ago
Managing Benefits from IS/IT Investments: An Empirical Investigation into Current Practice
In 1996 Ward et al reported the results of their UK study into the state of practice in evaluating and realizing benefits from IS/IT investments. This paper presents new empirical...
John Ward, Steven De Hertogh, Stijn Viaene