Sciweavers

345 search results - page 53 / 69
» When Systems Loose their Identity
Sort
View
APN
2007
Springer
14 years 4 months ago
The ComBack Method - Extending Hash Compaction with Backtracking
This paper presents the ComBack method for explicit state space exploration. The ComBack method extends the well-known hash compaction method such that full coverage of the state s...
Michael Westergaard, Lars Michael Kristensen, Gert...
SSD
2007
Springer
124views Database» more  SSD 2007»
14 years 4 months ago
Querying Objects Modeled by Arbitrary Probability Distributions
In many modern applications such as biometric identification systems, sensor networks, medical imaging, geology, and multimedia databases, the data objects are not described exact...
Christian Böhm, Peter Kunath, Alexey Pryakhin...
ICDE
2005
IEEE
115views Database» more  ICDE 2005»
14 years 3 months ago
Provenance-Aware Sensor Data Storage
Abstract— Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data pre...
Jonathan Ledlie, Chaki Ng, David A. Holland
ACSAC
2003
IEEE
14 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
IPPS
1999
IEEE
14 years 2 months ago
A Consistent History Link Connectivity Protocol
The RAIN (Reliable Array of Independent Nodes) project at Caltech is focusing on creating highly reliable distributed systems by leveraging commercially available personal compute...
Paul S. LeMahieu, Jehoshua Bruck