Sciweavers

2429 search results - page 196 / 486
» Using Aspects to Design a Secure System
Sort
View
121
Voted
CCS
2009
ACM
15 years 9 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
130
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
132
Voted
COMPSAC
2008
IEEE
15 years 9 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
FORTE
2004
15 years 4 months ago
Symbolic Diagnosis of Partially Observable Concurrent Systems
Abstract. Monitoring large distributed concurrent systems is a challenging task. In this paper we formulate (model-based) diagnosis by means of hidden state history reconstruction,...
Thomas Chatain, Claude Jard
186
Voted
KRDB
2003
184views Database» more  KRDB 2003»
15 years 4 months ago
Some Practical Issues in Building a Hybrid Deductive Geographic Information System with a DL Component
We report about some preliminary issues from the DFG project “Description Logics and Spatial Reasoning” (“DLS”, DFG Grant NE 279/8-1), one of whose goals is to develop a p...
Michael Wessel