Sciweavers

1709 search results - page 306 / 342
» networks 2000
Sort
View
COMPULOG
1999
Springer
14 years 1 months ago
Decomposable Constraints
Many constraint satisfaction problems can be naturally and efficiently modelled using non-binary constraints like the “all-different” and “global cardinality” constraints...
Ian P. Gent, Kostas Stergiou, Toby Walsh
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
14 years 13 days ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
ACSAC
2001
IEEE
14 years 11 days ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
AI
2003
Springer
14 years 11 days ago
The Importance of Fine-Grained Cue Phrases in Scientific Citations
Abstract. Scientific citations play a crucial role in maintaining the network of relationships among mutually relevant articles within a research field. Customarily, authors includ...
Robert E. Mercer, Chrysanne DiMarco
CSFW
2000
IEEE
14 years 10 days ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi