Sciweavers

5934 search results - page 1111 / 1187
» Detecting a Network Failure
Sort
View
LISA
2007
15 years 7 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
LISA
2008
15 years 7 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
ESOP
2008
Springer
15 years 7 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ALIFE
2007
15 years 5 months ago
A Synthetic Vision System Using Directionally Selective Motion Detectors to Recognize Collision
: Reliably recognizing objects approaching on a collision course is extremely important. In this paper, a synthetic vision system is proposed to tackle the problem of collision rec...
Shigang Yue, F. Claire Rind
AROBOTS
2010
180views more  AROBOTS 2010»
15 years 5 months ago
Reactive direction control for a mobile robot: a locust-like control of escape direction emerges when a bilateral pair of model
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...
« Prev « First page 1111 / 1187 Last » Next »