Sciweavers

2002 search results - page 29 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
NLE
2010
100views more  NLE 2010»
13 years 7 months ago
Formal and functional assessment of the pyramid method for summary content evaluation
Pyramid annotation makes it possible to evaluate quantitatively and qualitatively the content of machine-generated (or human) summaries. Evaluation methods must prove themselves a...
Rebecca J. Passonneau
IEAAIE
2004
Springer
14 years 2 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
SIGOPSE
1990
ACM
14 years 26 days ago
Fault tolerance using group communication
We propose group communication as an efficient mechanism to support fault tolerance. Our approach is based on an efficient reliable broadcast protocol that requires on average onl...
M. Frans Kaashoek, Andrew S. Tanenbaum
ECSA
2010
Springer
13 years 9 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
EDOC
2002
IEEE
14 years 1 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...