Sciweavers

4307 search results - page 605 / 862
» Dynamic Spyware Analysis
Sort
View
IWIA
2003
IEEE
14 years 4 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
MTDT
2003
IEEE
124views Hardware» more  MTDT 2003»
14 years 4 months ago
Systematic Memory Test Generation for DRAM Defects Causing Two Floating Nodes
Abstract: The high complexity of the faulty behavior observed in DRAMs is caused primarily by the presence of internal floating nodes in defective DRAMs. This paper describes a ne...
Zaid Al-Ars, A. J. van de Goor
SIGECOM
2003
ACM
119views ECommerce» more  SIGECOM 2003»
14 years 4 months ago
Preference elicitation in proxied multiattribute auctions
We consider the problem of minimizing preference elicitation in efficient multiattribute auctions, that support dynamic negotiation over non-price based attributes such as qualit...
Aditya V. Sunderam, David C. Parkes
AVBPA
2003
Springer
140views Biometrics» more  AVBPA 2003»
14 years 4 months ago
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images
A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Venu Govindaraju, Zhixin Shi, John Schneider
FIDJI
2003
Springer
14 years 4 months ago
Seamless UML Support for Service-Based Software Architectures
The UML has become the de facto standard for the analysis and design of complex software. Tool support today includes the generation of code realizing the structural model describe...
Matthias Tichy, Holger Giese