Sciweavers

41938 search results - page 8316 / 8388
» Complex Systems Modeling
Sort
View
ATAL
2003
Springer
14 years 3 months ago
Customizing AOSE methodologies by reusing AOSE features
Future large-scale software development projects will require engineering support for a diverse range of software quality attributes, such as privacy and openness. It is not feasi...
Thomas Juan, Leon Sterling, Maurizio Martelli, Viv...
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CONTEXT
2003
Springer
14 years 3 months ago
Unpacking Meaning from Words: A Context-Centered Approach to Computational Lexicon Design
Abstract. The knowledge representation tradition in computational lexicon design represents words as static encapsulations of purely lexical knowledge. We suggest that this view po...
Hugo Liu
CP
2003
Springer
14 years 3 months ago
Open Constraint Optimization
Constraint satisfaction has been applied with great success in closed-world scenarios, where all options and constraints are known from the beginning and fixed. With the internet,...
Boi Faltings, Santiago Macho-Gonzalez
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 3 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
« Prev « First page 8316 / 8388 Last » Next »