Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterSeptember 2023
Poster: Q-Scanner: A Fast Scanning Tool for Large-Scale SSL/TLS Configurations Measurement
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 1135–1137https://doi.org/10.1145/3603269.3610858Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols are used to encrypt data, protect privacy, and authenticate. However, the security of SSL/TLS itself depends on its configurations. While some scanning tools are used to measure SSL/...
- research-articleJune 2022
Understanding configuration dependencies of file systems
HotStorage '22: Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File SystemsPages 1–8https://doi.org/10.1145/3538643.3539756File systems have many configuration parameters. Such flexibility comes at the price of additional complexity which could lead to subtle configuration-related issues. To address the challenge, we study the potential configuration dependencies of a ...
- research-articleSeptember 2018
Localizing configurations in highly-configurable systems
SPLC '18: Proceedings of the 22nd International Systems and Software Product Line Conference - Volume 1Pages 269–273https://doi.org/10.1145/3233027.3236404The complexity of configurable systems has grown immensely, and it is only getting more complex. Such systems are a challenge for software testing and maintenance, because bugs and other defects can and do appear in any configuration. One common ...
- research-articleMarch 2018
Explaining learning performance using response-time, self-regulation and satisfaction from content: an fsQCA approach
LAK '18: Proceedings of the 8th International Conference on Learning Analytics and KnowledgePages 181–190https://doi.org/10.1145/3170358.3170397This study focuses on compiling students' response-time allocated to answer correctly or wrongly, their self-regulation, as well as their satisfaction from content, in order to explain high or medium/low learning performance. To this end, it proposes a ...
- research-articleJanuary 2015
Sensor Network Localization on the Group of Three-Dimensional Displacements
SIAM Journal on Control and Optimization (SICON), Volume 53, Issue 6Pages 3534–3561https://doi.org/10.1137/140957743We consider the problem of estimating relative configurations of nodes in a sensor network based on noisy measurements. By exploiting the cyclic constraints induced by the sensing topology to the network, we derive a constrained optimization on $SE(3)^n$. ...
-
- articleDecember 2012
Synergy and Its Limits in Managing Information Technology Professionals
Information Systems Research (INFORMS-ISR), Volume 23, Issue 4Pages 1175–1194https://doi.org/10.1287/isre.1110.0413We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on information technology (IT) professionals' job search behavior. Job search is a relatively novel dependent ...
- ArticleMarch 2010
Hierarchical Bayesian reliability analysis of complex dynamical systems
AEE'10: Proceedings of the 9th WSEAS international conference on Applications of electrical engineeringPages 181–186The Bayesian methods provide additional information about the meaningful parameters in a statistical analysis obtained by combining the prior and sampling distributions to form the posterior distribution of the parameters. The desired inferences are ...
- ArticleNovember 2009
A Trust-Based Benchmark for DBMS Configurations
PRDC '09: Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable ComputingPages 143–150https://doi.org/10.1109/PRDC.2009.31Database Management Systems (DBMS), the central component of many computers applications, are typically immersed in very complex environments. Protecting the DBMS from security attacks requires evaluating a long list of complex configuration ...
- research-articleOctober 2009
Set-theoretic estimation of hybrid system configurations
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics (TSMCPB), Volume 39, Issue 5Pages 1277–1291https://doi.org/10.1109/TSMCB.2009.2015280Hybrid systems serve as a powerful modeling paradigm for representing complex continuous controlled systems that exhibit discrete switches in their dynamics. The system and the models of the system are nondeterministic due to operation in uncertain ...
- ArticleSeptember 2009
Benchmarking Untrustworthiness in DBMS Configurations
LADC '09: Proceedings of the 2009 Fourth Latin-American Symposium on Dependable ComputingPages 1–8https://doi.org/10.1109/LADC.2009.23Database Management Systems (DBMS) are usually immersed in a so complex environment that assessing the security impact of any particular configuration choice is an extremely hard task. DBMS configuration untrustworthiness can be defined as a measure of ...
- articleNovember 2006
Examining Configurations and Firm Performance in a Suboptimal Equifinality Context
Organization Science (INFORMS-ORGS), Volume 17, Issue 6Pages 756–770https://doi.org/10.1287/orsc.1060.0203Gresov and Drazin's (1997) suggestions regarding the study of equifinality are used to investigate the organizational configurations that exists within a suboptimal equifinality context. A suboptimal equifinality situation exists when organizations must ...
- articleJuly 2006
Erratum to "Reduction of symmetric configurations n3" [Discrete Appl. Math. 99 (1-3) (2000)401-411]
Discrete Applied Mathematics (DAMA), Volume 154, Issue 11Pages 1645–1646https://doi.org/10.1016/j.dam.2006.03.015In [H.-G. Carstens, T. Dinski, E. Steffen, Reduction of symmetric configurations n3, Discrete Appl. Math. 99 (2000) 401-411] the authors claim that there exist a finite number of reductions such that every connected bicubic graph with girth ≥ 6 ...
- ArticleNovember 2004
A version model for supporting adaptation of web pages
WIDM '04: Proceedings of the 6th annual ACM international workshop on Web information and data managementPages 120–127https://doi.org/10.1145/1031453.1031476Maintenance of large Web sites is a complex task, similar in some sense to software maintenance. Content should be separated from the formatting rules, allowing independent development and maintenance of both parts. As in software maintenance, version ...
- articleAugust 2003
Interlocked open and closed linkages with few joints
Computational Geometry: Theory and Applications (COGE), Volume 26, Issue 1Pages 37–45https://doi.org/10.1016/S0925-7721(02)00171-2We study collections of linkages in 3-space that are interlocked in the sense that the linkages cannot be separated without one bar crossing through another. We explore pairs of linkages, one open chain and one closed chain, each with a small number of ...
- articleMay 2003
Polycyclic configurations
Polycyclic configurations constitute a generalization of the well-known class of cyclic configurations. They admit a concise description via voltage graphs over cyclic groups. Polycyclic (v k ) configurations are considered for k = 2, 3, 4. The ...
- ArticleJune 2002
Interlocked open linkages with few joints
SCG '02: Proceedings of the eighteenth annual symposium on Computational geometryPages 189–198https://doi.org/10.1145/513400.513424We advance the study of collections of open linkages in 3-space that may be interlocked in the sense that the linkages cannot be separated without one bar crossing through another. We consider chains of bars connected with rigid joints, revolute joints, ...
- articleJanuary 2002
The rectangle complexity of functions on two-dimensional lattices
Theoretical Computer Science (TCSC), Volume 270, Issue 1-2Pages 857–863https://doi.org/10.1016/S0304-3975(01)00281-XLet X be a non-empty set. Let f:Z2X. All vectors which occur have integer coefficients, and for =(a1,a2), =(b1,b2) we write or < if ajbj or aj < bj for j=1,2, respectively. Let >0. A -block is a set of the form B(){Z2| < +}. A -pattern is the ...
- articleJuly 2001
Construction of an Automaton From a Formula of the Monadic First-Order Theory of Natural Numbers
Cybernetics and Systems Analysis (KLU-CASA), Volume 37, Issue 4Pages 540–550https://doi.org/10.1023/A:1012781705048A method for construction of an automaton (an acceptor) from a first-order logical formula is proposed. The method is similar to the tableau method and can be considered as modification and improvement of it.
- articleAugust 2000
An Empirical Analysis of Process Industry Transformation Systems
Management Science (MANS), Volume 46, Issue 8Pages 1085–1099Process industries share many characteristics because their transformation systems are designed for nondiscrete materials. Hence, the process industries typically are lumped together in a general group and contrasted from the discrete industries as a ...