Sciweavers

42 search results - page 5 / 9
» Implementing interactive analysis of attack graphs using rel...
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
13 years 8 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
DAC
1994
ACM
13 years 11 months ago
BDD Variable Ordering for Interacting Finite State Machines
We address the problem of obtaining good variable orderings for the BDD representation of a system of interacting finite state machines (FSMs). Orderings are derived from the comm...
Adnan Aziz, Serdar Tasiran, Robert K. Brayton
VLDB
2004
ACM
143views Database» more  VLDB 2004»
14 years 25 days ago
GPX: Interactive Mining of Gene Expression Data
Discovering co-expressed genes and coherent expression patterns in gene expression data is an important data analysis task in bioinformatics research and biomedical applications. ...
Daxin Jiang, Jian Pei, Aidong Zhang
OOPSLA
2009
Springer
14 years 2 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
LAWEB
2003
IEEE
14 years 23 days ago
Storing RDF as a Graph
RDF is the first W3C standard for enriching information resources of the Web with detailed meta data. The semantics of RDF data is defined using a RDF schema. The most expressiv...
Valerie Bönström, Annika Hinze, Heinz Sc...