Sciweavers

1513 search results - page 241 / 303
» Cryptographic Pattern Matching
Sort
View
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
HT
2009
ACM
14 years 2 months ago
On hypertext narrative
Annals and chronicles may be the foundation of accounting, but writers of stories and histories have long known that they seldom render a satisfactory account of complex events. I...
Mark Bernstein
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integration Testing of Composite Applications
A service-oriented architecture enables composite applications that support business processes to be defined and built dynamically from loosely coupled and interoperable web servi...
Liam Peyton, Bernard Stepien, Pierre Seguin
IJCNN
2008
IEEE
14 years 2 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn
LCN
2008
IEEE
14 years 2 months ago
Range queries and load balancing in a hierarchically structured P2P system
—Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, a...
Simon Rieche, Bui The Vinh, Klaus Wehrle