Sciweavers

3618 search results - page 718 / 724
» Dynamic Data Integration Using Web Services
Sort
View
ACSAC
2008
IEEE
15 years 6 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
INFOCOM
2006
IEEE
15 years 5 months ago
Placing Relay Nodes for Intra-Domain Path Diversity
Abstract— To increase reliability and robustness of missioncritical services in the face of routing changes, it is often desirable and beneficial to take advantage of path diver...
Meeyoung Cha, Sue B. Moon, Chong-Dae Park, Aman Sh...
AAAI
2008
15 years 2 months ago
Unstructured Audio Classification for Environment Recognition
My thesis aims to contribute towards building autonomous agents that are able to understand their surrounding environment through the use of both audio and visual information. To ...
Selina Chu
CONEXT
2009
ACM
15 years 22 days ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
BTW
2003
Springer
129views Database» more  BTW 2003»
15 years 4 months ago
Type Checking in XOBE
: XML is the upcoming standard for internet data. Java is the most important programming language for internet applications. Nevertheless, in today’s languages and tools there is...
Martin Kempa, Volker Linnemann