Sciweavers

21430 search results - page 4254 / 4286
» Abstract Effective Models
Sort
View
107
Voted
DBSEC
2006
131views Database» more  DBSEC 2006»
14 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
84
Voted
FOIS
2006
14 years 11 months ago
Formalizing Ontology Alignment and its Operations with Category Theory
An ontology alignment is the expression of relations between different ontologies. In order to view alignments independently from the language expressing ontologies and from the te...
Antoine Zimmermann, Markus Krötzsch, Jé...
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
107
Voted
DAGSTUHL
2001
14 years 11 months ago
An Overview of the GXL Graph Exchange Language
GXL (Graph eXchange Language) is designed to be a standard exchange format for graph-based tools. GXL is defined as an XML sublanguage, which offers support for exchanging instanc...
Andreas Winter, Bernt Kullbach, Volker Riediger
NETWORKING
2004
14 years 11 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
« Prev « First page 4254 / 4286 Last » Next »