Sciweavers

2236 search results - page 294 / 448
» Intrusion detection techniques and approaches
Sort
View
RTSS
2005
IEEE
14 years 4 months ago
Fast On-the-Fly Parametric Real-Time Model Checking
This paper presents a local algorithm for solving the universal parametric real-time model-checking problem. The problem may be phrased as follows: given a real-time system and te...
Dezhuang Zhang, Rance Cleaveland
SOSYM
2008
114views more  SOSYM 2008»
13 years 10 months ago
Correctly defined concrete syntax
The syntax of modeling languages is usually defined in two steps. The abstract syntax identifies modeling concepts whereas the concrete syntax clarifies how these modeling concepts...
Thomas Baar
FTDB
2011
98views more  FTDB 2011»
13 years 1 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 5 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
ECBS
2004
IEEE
153views Hardware» more  ECBS 2004»
14 years 2 months ago
Architectural Description with Integrated Data Consistency Models
The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed...
Peter Tabeling