Sciweavers

1090 search results - page 72 / 218
» A Replicated Monitoring Tool
Sort
View
ICCS
2005
Springer
14 years 1 months ago
Evolutionary Discovery of Arbitrary Self-replicating Structures
In this paper we describe our recent use of genetic programming methods to automatically discover CA rule sets that produce self-replication of arbitrary given structures. Our init...
Zhijian Pan, James A. Reggia
WMTE
2002
IEEE
14 years 19 days ago
Lightweight Extensions of Collaborative Modeling Systems for Synchronous Use on PDA's
Based on experience in orchestrating co llaborative learning scenarios with ubiquitous computing technology, two strategies for extending a co -constructive modeling environment w...
Niels Pinkwart, Christian Schäfer, Heinz Ulri...
SEC
2007
13 years 9 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
APN
2005
Springer
14 years 1 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...
VIZSEC
2004
Springer
14 years 1 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah