Sciweavers

2372 search results - page 273 / 475
» Probabilistic calling context
Sort
View
CCS
2008
ACM
13 years 10 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
DOCENG
2005
ACM
13 years 10 months ago
Compiling XPath for streaming access policy
We show how the full XPath language can be compiled into a minimal subset suited for stream-based evaluation. Specifically, we show how XPath normalization into a core language a...
Pierre Genevès, Kristoffer Høgsbro R...
ECLIPSE
2005
ACM
13 years 10 months ago
Building a whole-program type analysis in Eclipse
Eclipse has the potential to become a widely-used platform for implementation and dissemination of various static analyses for Java. In order to realize this potential, it is impo...
Mariana Sharp, Jason Sawin, Atanas Rountev
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ECAIW
2008
Springer
13 years 10 months ago
Automatic Tailoring of an Actor Profile Ontology
Abstract. Knowledge tailoring is a powerful tool to customize a system according to the particular view and interests of the user, in such a way that usability of the system become...
Montserrat Batet, Aïda Valls, Karina Gibert, ...