Sciweavers

2560 search results - page 361 / 512
» Analysis Tool for Honeypot Systems
Sort
View
WSC
2004
15 years 3 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
15 years 8 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst
EPIA
2005
Springer
15 years 7 months ago
A Real Time Data Extraction, Transformation and Loading Solution for Semi-structured Text Files
Space applications’ users have been relying for the past decades on custom developed software tools capable of addressing short term necessities during critical Spacecraft contro...
Nuno Viana, Ricardo Raminhos, João Moura Pi...
ICCS
2005
Springer
15 years 7 months ago
Computational Complexity and Distributed Execution in Water Quality Management
Abstract. Modeling is considered an inherent part of design, operation and optimization of Water Quality Systems. Models are used for running so-called Virtual Experiments, such as...
Maria Chtepen, Filip H. A. Claeys, Bart Dhoedt, Pe...
CAISE
2003
Springer
15 years 7 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani