Sciweavers

336 search results - page 44 / 68
» Monitoring modulo theories
Sort
View
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 11 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
IACR
2011
130views more  IACR 2011»
12 years 9 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
ICRA
1999
IEEE
133views Robotics» more  ICRA 1999»
14 years 2 months ago
Control of Flexible-Manufacturing Workcells Using Extended Moore Automata
The modeling and control flexible-manufacturing workcells (FMCs) has generally been performed in a hierarchical structure, where at the highest level they have been modeled as dis...
A. Ramírez, C. Sriskandarajah, Beno Benhabi...
DAGSTUHL
2001
13 years 11 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
JMIV
2000
70views more  JMIV 2000»
13 years 9 months ago
The Topological Structure of Scale-Space Images
We investigate the "deep structure" of a scale-space image. The emphasis is on topology, i.e. we concentrate on critical points--pointswith vanishing gradient--and top-p...
Luc Florack, Arjan Kuijper