Sciweavers

7134 search results - page 1230 / 1427
» A comparative study of map use
Sort
View
ACSAC
2004
IEEE
14 years 2 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
BROADNETS
2004
IEEE
14 years 2 months ago
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables simultaneous transmissions in wireless mesh networks. The IE...
Arup Acharya, Archan Misra, Sorav Bansal
ATVA
2006
Springer
83views Hardware» more  ATVA 2006»
14 years 2 months ago
A Fresh Look at Testing for Asynchronous Communication
Testing is one of the fundamental techniques for verifying if a computing system conforms to its specification. We take a fresh look at the theory of testing for message-passing sy...
Puneet Bhateja, Paul Gastin, Madhavan Mukund
CAISE
2006
Springer
14 years 2 months ago
An Efficient Approach to Support Querying Secure Outsourced XML Information
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
Yin Yang, Wilfred Ng, Ho Lam Lau, James Cheng
ECAI
2004
Springer
14 years 2 months ago
Goal Specification in Presence of Non-Deterministic Actions
One important aspect in directing cognitive robots or agents is to formally specify what is expected of them. This is often referred to as goal specification. For agents whose act...
Chitta Baral, Jicheng Zhao
« Prev « First page 1230 / 1427 Last » Next »