Sciweavers

1737 search results - page 133 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
122
Voted
SPIN
2009
Springer
15 years 9 months ago
Subsumer-First: Steering Symbolic Reachability Analysis
Abstract. Symbolic reachability analysis provides a basis for the verification of software systems by offering algorithmic support for the exploration of the program state space ...
Andrey Rybalchenko, Rishabh Singh
104
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
145
Voted
ISI
2004
Springer
15 years 8 months ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
98
Voted
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
112
Voted
SCS
2001
15 years 4 months ago
High Level Failure Analysis for Integrated Modular Avionics
Integrated Modular Avionics (IMA) is the term used for a common computer network aboard an aircraft. In order to gain full benefit from this technology a strategy is required to a...
Philippa Conmy, John A. McDermid