Sciweavers

1424 search results - page 94 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 2 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
HYBRID
2001
Springer
14 years 20 days ago
Accurate Event Detection for Simulating Hybrid Systems
It has been observed that there are a variety of situations in which the most popular hybrid simulation methods can fail to properly detect the occurrence of discrete events. In th...
Joel M. Esposito, Vijay Kumar, George J. Pappas
ECIS
2003
13 years 9 months ago
An architecture model for supporting application integration decisions
For a successful information systems architecture management, reference models and decision rules must be provided. In this paper, an architecture model and design rules are propo...
Robert Winter
BMCBI
2008
129views more  BMCBI 2008»
13 years 8 months ago
An analytic and systematic framework for estimating metabolic flux ratios from 13C tracer experiments
Background: Metabolic fluxes provide invaluable insight on the integrated response of a cell to environmental stimuli or genetic modifications. Current computational methods for e...
Ari Rantanen, Juho Rousu, Paula Jouhten, Nicola Za...
ACSAC
2002
IEEE
14 years 1 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell