Sciweavers

522 search results - page 34 / 105
» Necessary but Not Sufficient
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...
EPEW
2006
Springer
13 years 11 months ago
Explicit Inverse Characterizations of Acyclic MAPs of Second Order
This paper shows how to construct a Markovian arrival process of second order from information on the marginal distribution and on its autocorrelation function. More precisely, clo...
Armin Heindl, Gábor Horváth, Karsten...
AAAI
2008
13 years 10 months ago
On the Enactability of Business Protocols
Protocols specifying business interactions among autonomous parties enable reuse and promote interoperability. A protocol is specified from a global viewpoint, but enacted in a di...
Nirmit Desai, Munindar P. Singh
AISB
2008
Springer
13 years 9 months ago
A Modelling Framework for Functional Imagination
Imagination is generally regarded as a very powerful and advanced cognitive ability. In this paper we propose a modelling framework for what we call functional imagination: the ab...
Hugo Gravato Marques, Owen Holland, Richard Newcom...
CIE
2008
Springer
13 years 9 months ago
Computable Categoricity of Graphs with Finite Components
A computable graph is computably categorical if any two computable presentations of the graph are computably isomorphic. In this paper we investigate the class of computably catego...
Barbara F. Csima, Bakhadyr Khoussainov, Jiamou Liu