Sciweavers

556 search results - page 22 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ISMIS
2005
Springer
15 years 5 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
TLCA
1997
Springer
15 years 3 months ago
Games and Weak-Head Reduction for Classical PCF
We present a game model for classical PCF, a nite version of PCF extended by a catch/throw mechanism. This model is build from E-dialogues, a kind of two-players game de ned by Lor...
Hugo Herbelin
EUROGP
2009
Springer
149views Optimization» more  EUROGP 2009»
15 years 6 months ago
Adaptation, Performance and Vapnik-Chervonenkis Dimension of Straight Line Programs
Abstract. We discuss here empirical comparation between model selection methods based on Linear Genetic Programming. Two statistical methods are compared: model selection based on ...
José Luis Montaña, César Luis...
AMC
2011
14 years 3 months ago
Ruin theory with excess of loss reinsurance and reinstatements
The present paper studies the probability of ruin of an insurer, if excess of loss reinsurance with reinstatements is applied. In the setting of the classical CramerLundberg risk ...
Hansjörg Albrecher, Sandra Haas
ESOP
2003
Springer
15 years 4 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen