Sciweavers

207 search results - page 17 / 42
» Detecting Bottleneck in n-Tier IT Applications Through Analy...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICPR
2000
IEEE
14 years 5 days ago
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models
In this paper we address the object recognition problem in a probabilistic framework to detect and describe object appearance through image features organized by means of active c...
Xavier Orriols, Ricardo Toledo, Xavier Binefa, Pet...
BMCBI
2010
96views more  BMCBI 2010»
13 years 8 months ago
OpenChrom: a cross-platform open source software for the mass spectrometric analysis of chromatographic data
Background: Today, data evaluation has become a bottleneck in chromatographic science. Analytical instruments equipped with automated samplers yield large amounts of measurement d...
Philip Wenig, Juergen Odermatt
CAISE
2006
Springer
13 years 11 months ago
Data Conceptualisation for Web-Based Data-Centred Application Design
The paper describes the conceptualisation process in the ReQuest approach, a wide-spectrum methodology for web-based information systems analysis and development. This methodology ...
Julien Vilz, Anne-France Brogneaux, Ravi Ramdoyal,...
ACMSE
2006
ACM
14 years 1 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.