Sciweavers

1737 search results - page 281 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
235
Voted
GIS
2005
ACM
16 years 3 months ago
Contraflow network reconfiguration for evacuation planning: a summary of results
Contraflow, or lane reversal, is a way of increasing outbound capacity of a real network by reversing the direction of inbound roads during evacuations. The contraflow is consider...
Sangho Kim, Shashi Shekhar
128
Voted
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
15 years 7 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
AVSS
2009
IEEE
15 years 5 months ago
Bayesian Bio-inspired Model for Learning Interactive Trajectories
—Automatic understanding of human behavior is an important and challenging objective in several surveillance applications. One of the main problems of this task consists in accur...
Alessio Dore, Carlo S. Regazzoni
NDSS
2007
IEEE
15 years 8 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
139
Voted
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 7 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu