Sciweavers

503 search results - page 89 / 101
» Data Flow Analysis for CCS
Sort
View
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 2 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 7 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
FASE
2008
Springer
13 years 9 months ago
A Formal Framework for Developing Adaptable Service-Based Applications
Web services are open, interoperable, easy to integrate and reuse, and are extensively used in many application domains. Research and best practices have produced excellent support...
Leen Lambers, Leonardo Mariani, Hartmut Ehrig, Mau...
TMI
2008
171views more  TMI 2008»
13 years 7 months ago
Fluid Registration of Diffusion Tensor Images Using Information Theory
We apply an information-theoretic cost metric, the symmetrized Kullback-Leibler (sKL) divergence, or -divergence, to fluid registration of diffusion tensor images. The difference b...
Ming-Chang Chiang, Alex D. Leow, Andrea D. Klunder...
SGP
2007
13 years 10 months ago
Shape reconstruction from unorganized cross-sections
In this paper, we consider the problem of reconstructing a shape from unorganized cross-sections. The main motivation for this problem comes from medical imaging applications wher...
Jean-Daniel Boissonnat, Pooran Memari