Sciweavers

468 search results - page 81 / 94
» A multi-objective approach to search-based test data generat...
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
GCB
2005
Springer
98views Biometrics» more  GCB 2005»
14 years 1 months ago
Composite Module Analyst: A Fitness-Based Tool for Prediction of Transcription Regulation
: Functionally related genes involved in the same molecular-genetic, biochemical, or physiological process are often regulated coordinately Such regulation is provided by precisely...
Alexander E. Kel, Tatiana Konovalova, Tagir Valeev...
AMTA
2004
Springer
14 years 1 months ago
Interlingual Annotation for MT Development
MT systems that use only superficial representations, including the current generation of statistical MT systems, have been successful and useful. However, they will experience a p...
Florence Reeder, Bonnie J. Dorr, David Farwell, Ni...
EDO
2000
Springer
13 years 11 months ago
Component Metadata for Software Engineering Tasks
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...