Sciweavers

1816 search results - page 289 / 364
» Trace oblivious computation
Sort
View
CSCW
2004
ACM
14 years 2 months ago
Behind the help desk: evolution of a knowledge management system in a large organization
This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...
IMC
2004
ACM
14 years 2 months ago
Identifying elephant flows through periodically sampled packets
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also ver...
Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jia...
CAV
2004
Springer
202views Hardware» more  CAV 2004»
14 years 2 months ago
Statistical Model Checking of Black-Box Probabilistic Systems
Abstract. We propose a new statistical approach to analyzing stochastic systems against specifications given in a sublogic of continuous stochastic logic (CSL). Unlike past numeri...
Koushik Sen, Mahesh Viswanathan, Gul Agha
CCS
2004
ACM
14 years 2 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
EUROCRYPT
2004
Springer
14 years 2 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels