Sciweavers

1028 search results - page 137 / 206
» Using Attack Graphs to Design Systems
Sort
View
SIGCOMM
2004
ACM
14 years 3 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
BPM
2006
Springer
166views Business» more  BPM 2006»
14 years 1 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
EUROSYS
2009
ACM
14 years 6 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ICTAI
2010
IEEE
13 years 7 months ago
Multicriteria Reasoning Considering Reliability or Availability
Abstract--Reliability and/or availability are increasingly important aspects in the design of systems, especially networks and service offerings. Optimization here is a multi-crite...
Tarik Hadzic, Helmut Simonis
21
Voted
ICRA
2008
IEEE
118views Robotics» more  ICRA 2008»
14 years 4 months ago
Enlarging regions of stable running with segmented legs
— In human and animal running spring-like leg behavior is found, and similar concepts have been demonstrated by various robotic systems in the past. In general, a spring-mass mod...
Juergen Rummel, Fumiya Iida, James Andrew Smith, A...