Sciweavers

2715 search results - page 463 / 543
» Network bucket testing
Sort
View
KES
2005
Springer
14 years 1 months ago
Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration
: The aim of this study was to demonstrate the effectiveness of an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of diesel spray penetration length in the cylind...
Shaun H. Lee, Robert J. Howlett, Simon D. Walters,...
RAID
2005
Springer
14 years 1 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 1 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 1 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...