Sciweavers

2624 search results - page 485 / 525
» The 2LIP model and its implementations
Sort
View
IFIP
2004
Springer
14 years 2 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
NMR
2004
Springer
14 years 2 months ago
A SAT-based polynomial space algorithm for answer set programming
The relation between answer set programming (ASP) and propositional satisfiability (SAT) is at the center of many research papers, partly because of the tremendous performance bo...
Enrico Giunchiglia, Yuliya Lierler, Marco Maratea
CVPR
2010
IEEE
14 years 2 months ago
Adaptive Generic Learning for Face Recognition from a Single Sample per Person
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the datab...
Yu Su, Shiguang Shan, Xilin Chen, wen Gao
ACSC
2003
IEEE
14 years 2 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
DASFAA
2003
IEEE
151views Database» more  DASFAA 2003»
14 years 2 months ago
Approximate String Matching in DNA Sequences
Approximate string matching on large DNA sequences data is very important in bioinformatics. Some studies have shown that suffix tree is an efficient data structure for approxim...
Lok-Lam Cheng, David Wai-Lok Cheung, Siu-Ming Yiu