Sciweavers

935 search results - page 109 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
BIOCOMP
2010
13 years 7 months ago
A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection from CT Images
- We present a novel hierarchical modular decision engine for lung nodule detection from CT images implemented by Artificial Neural Networks. The proposed Computer Aided Detection ...
Ömer M. Soysal, Jianhua Chen, Steven Bujenovi...
TAOSD
2010
13 years 7 months ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
PRDC
2006
IEEE
14 years 3 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
ISORC
1998
IEEE
14 years 1 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz