Sciweavers

253 search results - page 26 / 51
» How to Transform an Analyzer into a Verifier
Sort
View
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
DIS
2006
Springer
13 years 11 months ago
Scientific Discovery: A View from the Trenches
One of the primary goals in discovery science is to understand the human scientific reasoning processes. Despite sporadic success of automated discovery systems, few studies have s...
Catherine Blake, Meredith Rendall
VL
2008
IEEE
130views Visual Languages» more  VL 2008»
14 years 1 months ago
Visualization for information exploration and analysis
Making sense of data becomes more challenging as the data grows larger and becomes more complex. If a picture truly can be worth a thousand words, then clever visualizations of da...
John T. Stasko
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
13 years 9 months ago
Swing-up control for n-link planar robot with single passive joint using the notion of virtual composite links
In this paper, we concern a swing-up control problem for an n-link revolute planar robot with any one of the joint being a passive joint. The goal of this study is to design and an...
Xin Xin, Jin-Hua She, Taiga Yamasaki
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray