Sciweavers

111 search results - page 13 / 23
» Proactive Detection of Computer Worms Using Model Checking
Sort
View
ENTCS
2006
172views more  ENTCS 2006»
13 years 8 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
DIMVA
2008
13 years 10 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
ISMAR
2007
IEEE
14 years 3 months ago
An Industrial Augmented Reality Solution For Discrepancy Check
Construction companies employ CAD software during the planning phase, but what is finally built often does not match the original plan. The procedure of validating the model is c...
Pierre Georgel, Pierre Schroeder, Selim Benhimane,...
RAID
2010
Springer
13 years 6 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
SMA
1995
ACM
176views Solid Modeling» more  SMA 1995»
14 years 8 days ago
Incremental algorithms for collision detection between solid models
: Fast and accurate collision detection between general solid models is a fundamental problem in solid modeling, robotics, animation and computer-simulated environments. Most of th...
Madhav K. Ponamgi, Dinesh Manocha, Ming C. Lin