Sciweavers

1028 search results - page 184 / 206
» Using Attack Graphs to Design Systems
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
A recommender for conflict resolution support in optimistic model versioning
The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contrad...
Petra Brosch, Martina Seidl, Gerti Kappel
WWW
2005
ACM
14 years 9 months ago
WEBCAP: a capacity planning tool for web resource management
A staggering number of multimedia applications are being introduced every day. Yet, the inordinate delays encountered in retrieving multimedia documents make it difficult to use t...
Sami Habib, Maytham Safar
VL
1992
IEEE
192views Visual Languages» more  VL 1992»
14 years 21 days ago
Graphic Object Layout with Interactive Genetic Algorithms
Automatic graphic objectlayout methods havelong been studied in many application areas in which graphic objects should be laid out to satisfy the constraints specific to each appl...
Toshiyuki Masui
67
Voted
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 8 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
CIKM
2004
Springer
14 years 2 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan