Sciweavers

3384 search results - page 483 / 677
» More Testable Properties
Sort
View
ACSW
2006
13 years 11 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
AVI
2004
13 years 11 months ago
Shrinking window operations for expanding display space
Recent research and technology advances indicate that multiple monitor systems are likely to become commonplace in the near future. An important property of such systems is that t...
Dugald Ralph Hutchings, John T. Stasko
BILDMED
2006
112views Algorithms» more  BILDMED 2006»
13 years 11 months ago
Extracting Consistent and Manifold Interfaces from Multi-valued Volume Data Sets
We propose an algorithm to construct a set of interfaces that separate the connected components of a multi-valued volume dataset. While each single interface is a manifold triangle...
Stephan Bischoff, Leif Kobbelt
CASCON
2006
117views Education» more  CASCON 2006»
13 years 11 months ago
A backtracking LR algorithm for parsing ambiguous context-dependent languages
Parsing context-dependent computer languages requires an ability to maintain and query data structures while parsing for the purpose of influencing the parse. Parsing ambiguous co...
Adrian D. Thurston, James R. Cordy
CMS
2006
127views Communications» more  CMS 2006»
13 years 11 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis