Sciweavers

1352 search results - page 170 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CCS
2003
ACM
14 years 3 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
KBSE
2003
IEEE
14 years 3 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
DT
2006
180views more  DT 2006»
13 years 10 months ago
A SystemC Refinement Methodology for Embedded Software
process: Designers must define higher abstraction levels that allow system modeling. They must use description languages that handle both hardware and software components to descri...
Jérôme Chevalier, Maxime de Nanclas, ...
UAI
2007
13 years 11 months ago
User-Centered Methods for Rapid Creation and Validation of Bayesian Belief Networks
Bayesian networks (BN) are particularly well suited to capturing vague and uncertain knowledge. However, the capture of this knowledge and associated reasoning from human domain e...
Jonathan D. Pfautz, Zach Cox, Geoffrey Catto, Davi...
ICMCS
2007
IEEE
118views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Cascading Multimodal Verification using Face, Voice and Iris Information
In this paper we propose a novel fusion strategy which fuses information from multiple physical traits via a cascading verification process. In the proposed system users are veri...
Ping-Han Lee, Lu-Jong Chu, Yi-Ping Hung, Sheng-Wen...