Sciweavers

187 search results - page 4 / 38
» Challenges in Securing the Domain Name System
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
IJMI
2002
82views more  IJMI 2002»
15 years 3 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...
ISI
2006
Springer
15 years 3 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
INLG
2010
Springer
15 years 1 months ago
JU_CSE_GREC10: Named Entity Generation at GREC 2010
This paper presents the experiments carried out at Jadavpur University as part of the participation in the GREC Named Entity Generation Challenge 2010. The Baseline system is base...
Amitava Das, Tanik Saikh, Tapabrata Mondal, Sivaji...
SAFECOMP
2010
Springer
15 years 2 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner