Sciweavers

8669 search results - page 1546 / 1734
» Computing matrix representations
Sort
View
EUROSEC
2010
ACM
15 years 7 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
15 years 7 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...
APSEC
2003
IEEE
15 years 7 months ago
An Extensible Framework for Collaborative Software Engineering
The size, complexity and duration of typical software engineering projects means that teams of developers will work on them. However, with the exception of version control systems...
Carl Cook, Neville Churcher
ICDAR
2003
IEEE
15 years 7 months ago
A Majority Voting Scheme for Multiresolution Recognition of Handprinted Numerals
This paper proposes a simple voting scheme for off-line recognition of handprinted numerals. One of the main features of the proposed scheme is that this is not script dependent. ...
Ujjwal Bhattacharya, B. B. Chaudhuri
ICNP
2003
IEEE
15 years 7 months ago
Packet Classification Using Extended TCAMs
CAMs are the most popular practical method for implementing packet classification in high performance routers. Their principal drawbacks are high power consumption and inefficient...
Ed Spitznagel, David E. Taylor, Jonathan S. Turner
« Prev « First page 1546 / 1734 Last » Next »