Sciweavers

82 search results - page 11 / 17
» sp 2008
Sort
View
CSCWD
2008
Springer
13 years 11 months ago
Running smart process based on goals
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
Zongmin Shang, Haiyang Wang, Liqiang Wang, Hui Li,...
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 4 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
14 years 4 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 4 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...