Sciweavers

545 search results - page 96 / 109
» Computer-Aided Method Engineering: An Analysis of Existing E...
Sort
View
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
DOCENG
2007
ACM
13 years 12 months ago
Genre driven multimedia document production by means of incremental transformation
Genre, like layout, is an important factor in effective communication, and automated tools which assist in genre compliance are thus of considerable value. Genres are reusable met...
Marc Nanard, Jocelyne Nanard, Peter R. King, Ludov...
NDSS
2007
IEEE
14 years 2 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
SIGDOC
1998
ACM
14 years 5 days ago
Managing the Software Design Documents with XML
It is hard to manage the software design documents within a distributed development team. The issues include the format, distribution and evolution of data. This paper mainly focu...
Junichi Suzuki, Yoshikazu Yamamoto
DATE
2006
IEEE
83views Hardware» more  DATE 2006»
14 years 2 months ago
What lies between design intent coverage and model checking?
Practitioners of formal property verification often work around the capacity limitations of formal verification tools by breaking down properties into smaller properties that ca...
Sayantan Das, Prasenjit Basu, Pallab Dasgupta, P. ...