Sciweavers

1159 search results - page 9 / 232
» The LINK system: MUC-4 test results and analysis
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
FEDCSIS
2011
87views more  FEDCSIS 2011»
12 years 7 months ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
AMR
2007
Springer
139views Multimedia» more  AMR 2007»
14 years 1 months ago
Imagination: Exploiting Link Analysis for Accurate Image Annotation
Abstract. The advent of digital photography calls for effective techniques for managing growing amounts of color images. Systems that only rely on low-level image features are now...
Ilaria Bartolini, Paolo Ciaccia
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 6 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 1 months ago
Queuing with Adaptive Modulation over MIMO Wireless Links for Deadline Constrained Traffic: Cross-Layer Analysis and Design
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
Jalil S. Harsini, Farshad Lahouti