Sciweavers

15614 search results - page 206 / 3123
» The State of State
Sort
View
DSRT
2008
IEEE
15 years 10 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
15 years 10 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
ICDM
2008
IEEE
230views Data Mining» more  ICDM 2008»
15 years 10 months ago
Evolutionary Clustering by Hierarchical Dirichlet Process with Hidden Markov State
This paper studies evolutionary clustering, which is a recently hot topic with many important applications, noticeably in social network analysis. In this paper, based on the rece...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
ISPASS
2008
IEEE
15 years 10 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
PIMRC
2008
IEEE
15 years 10 months ago
Channel state information based LLR clipping in list MIMO detection
—Suboptimal detection schemes, such as list MIMO detection, often face the challenge of having to “guess” at the decision reliability for some of the detected bits. A simple ...
David L. Milliner, Ernesto Zimmermann, John R. Bar...