Sciweavers

458 search results - page 45 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
ACSAC
2001
IEEE
14 years 2 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
NSDI
2004
14 years 10 days ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...
RV
2010
Springer
119views Hardware» more  RV 2010»
13 years 9 months ago
LarvaStat: Monitoring of Statistical Properties
Execution paths expose non-functional information such as system reliability and performance, which can be collected using runtime verification techniques. Statistics gathering an...
Christian Colombo, Andrew Gauci, Gordon J. Pace
BIOSTEC
2008
137views Healthcare» more  BIOSTEC 2008»
14 years 2 days ago
Breast Contour Detection with Stable Paths
Abstract. Breast cancer conservative treatment (BCCT), due to its proven oncological safety, is considered, when feasible, the gold standard of breast cancer treatment. However, ae...
Jaime S. Cardoso, Ricardo Sousa, Luís Filip...
BMCBI
2010
104views more  BMCBI 2010»
13 years 11 months ago
A method for automatically extracting infectious disease-related primers and probes from the literature
Background: Primer and probe sequences are the main components of nucleic acid-based detection systems. Biologists use primers and probes for different tasks, some related to the ...
Miguel García-Remesal, Alejandro Cuevas, Vi...