Sciweavers

88 search results - page 6 / 18
» Detecting model inconsistency through operation-based model ...
Sort
View
ENTCS
2008
88views more  ENTCS 2008»
13 years 7 months ago
Behavior-Preserving Simulation-to-Animation Model and Rule Transformations
In the framework of graph transformation, simulation rules define the operational behavior of visual models. Moreover, it has been shown already how to construct animation rules f...
Claudia Ermel, Hartmut Ehrig
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 7 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
COLCOM
2007
IEEE
14 years 1 months ago
SemCW: Semantic collaborative writing using RST
—During collaborative writing each author works on a copy of the shared document. These copies are then merged to produce the final document. This asynchronous work is supported...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Nis...
IEEEARES
2007
IEEE
14 years 1 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
LICS
2003
IEEE
14 years 21 days ago
New Directions in Instantiation-Based Theorem Proving
We consider instantiation-based theorem proving whereby instances of clauses are generated by certain inferences, and where inconsistency is detected by propositional tests. We gi...
Harald Ganzinger, Konstantin Korovin