Sciweavers

78 search results - page 15 / 16
» Event Detection in Multilevel Secure Active Databases
Sort
View
SE
2007
13 years 7 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
ACSAC
2008
IEEE
14 years 20 days ago
pwdArmor: Protecting Conventional Password-Based Authentications
pwdArmor is a framework for fortifying conventional password-based authentications. Many password protocols are performed within an encrypted tunnel (e.g., TLS) to prevent the exp...
Timothy W. van der Horst, Kent E. Seamons
TDSC
2010
146views more  TDSC 2010»
13 years 27 days ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
KBSE
2005
IEEE
13 years 11 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
AIHC
2007
Springer
14 years 11 days ago
Modeling Naturalistic Affective States Via Facial, Vocal, and Bodily Expressions Recognition
Affective and human-centered computing have attracted a lot of attention during the past years, mainly due to the abundance of devices and environments able to exploit multimodal i...
Kostas Karpouzis, George Caridakis, Loïc Kess...