Sciweavers

2272 search results - page 313 / 455
» Validity Invariants and Effects
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 9 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
ICMCS
2005
IEEE
99views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Segmentation of 3D Objects Using Pulse-Coupled Oscillator Networks
Along with image and video libraries, archives of 3D models have recently gained increasing attention. Accordingly, there is an increasing demand for solutions enabling retrieval ...
Eva Ceccarelli, Alberto Del Bimbo, Pietro Pala
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Semantic Routing and Filtering for Large-Scale Video Streams Monitoring
In this paper, we propose a semantic routing and filtering framework for large-scale monitoring of video streams. Our goal is to build a distributed system that at any given time ...
Ching-Yung Lin, Olivier Verscheure, Lisa Amini
ICNP
2005
IEEE
15 years 9 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...