Sciweavers

1291 search results - page 228 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ACSAC
2004
IEEE
14 years 12 days ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
ICSE
2000
IEEE-ACM
14 years 7 days ago
Generating statechart designs from scenarios
This paper presents an algorithm for automatically generating UML statecharts from a collection of UML sequence diagrams. Computer support for this transition between requirements...
Jon Whittle, Johann Schumann
EWSN
2010
Springer
13 years 12 months ago
An Adaptive Strategy for Energy-Efficient Data Collection in Sparse Wireless Sensor Networks
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...
ASSETS
2008
ACM
13 years 10 months ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
13 years 10 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei