Sciweavers

2703 search results - page 503 / 541
» Learning operational requirements from goal models
Sort
View
IAT
2007
IEEE
14 years 27 days ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...
ACSAC
2004
IEEE
14 years 24 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ASPLOS
1991
ACM
14 years 17 days ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
DSVIS
2008
Springer
13 years 10 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
APIN
2004
127views more  APIN 2004»
13 years 9 months ago
CLSS: An Intelligent Crane Lorry Scheduling System
Companies that provide crane-lorry services are faced with the daily need to perform vehicle and driver allocation and scheduling. Many companies still do this manually due to the ...
Hon Wai Chun, Rebecca Y. M. Wong