Sciweavers

2990 search results - page 503 / 598
» Thresholding for Change Detection
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
APSEC
2005
IEEE
14 years 3 months ago
An Integrated Solution for Testing and Analyzing Java Applications in an Industrial Setting
Testing a large-scale, real-life commercial software application is a very challenging task due to the constant changes in the software, the involvement of multiple programmers an...
W. Eric Wong, J. Jenny Li
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
CIMCA
2005
IEEE
14 years 3 months ago
Improving Rule Generation Precision for Domain Knowledge based Wrappers
Wrappers play an important role in extracting specified information from various sources. Wrapper rules by which information is extracted are often created from the domain-specifi...
Chang-Hoo Jeong, Sung-Jin Jhun, Myung-Eun Lim, Sun...
DATE
2005
IEEE
96views Hardware» more  DATE 2005»
14 years 3 months ago
DVS for On-Chip Bus Designs Based on Timing Error Correction
On-chip buses are typically designed to meet performance constraints at worst-case conditions, including process corner, temperature, IR-drop, and neighboring net switching patter...
Himanshu Kaul, Dennis Sylvester, David Blaauw, Tre...