Sciweavers

1566 search results - page 146 / 314
» On a Cone Covering Problem
Sort
View
SOSE
2006
IEEE
15 years 10 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
HICSS
2003
IEEE
115views Biometrics» more  HICSS 2003»
15 years 10 months ago
Design and Implementation of a Bridge between CORBA's Notification Service and the Java Message Service
Messaging plays a central role in the development of distributed object-oriented systems. It is supported by the specification of the Java Message Service (JMS) and CORBA’s Noti...
Markus Aleksy, Martin Schader, Alexander Schnell
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 9 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
RANDOM
2001
Springer
15 years 9 months ago
On the Equivalence between the Primal-Dual Schema and the Local-Ratio Technique
We discuss two approximation approaches, the primal-dual schema and the local-ratio technique. We present two relatively simple frameworks, one for each approach, which extend know...
Reuven Bar-Yehuda, Dror Rawitz