Sciweavers

6167 search results - page 875 / 1234
» Can Refinement be Automated
Sort
View
144
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
142
Voted
ARTMED
2006
85views more  ARTMED 2006»
15 years 5 months ago
Using ontologies linked with geometric models to reason about penetrating injuries
Medical assessment of penetrating injuries is a difficult and knowledge-intensive task. Physical examination and computed tomographic (CT) imaging data must be combined with detai...
Daniel L. Rubin, Olivier Dameron, Yasser Bashir, D...
155
Voted
IANDC
2008
150views more  IANDC 2008»
15 years 5 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
FGCS
2006
113views more  FGCS 2006»
15 years 5 months ago
Performance feature identification by comparative trace analysis
This work introduces a method for instrumenting applications, producing execution traces, and visualizing multiple trace instances to identify performance features. The approach p...
Daniel P. Spooner, Darren J. Kerbyson
146
Voted
INTEGRATION
2008
87views more  INTEGRATION 2008»
15 years 5 months ago
SafeResynth: A new technique for physical synthesis
Physical synthesis is a relatively young field in Electronic Design Automation. Many published optimizations for physical synthesis end up hurting the quality of the final design,...
Kai-Hui Chang, Igor L. Markov, Valeria Bertacco