Sciweavers

3564 search results - page 453 / 713
» Evaluating a Formal Modelling Language
Sort
View
133
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 3 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
166
Voted
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
POPL
2008
ACM
16 years 4 months ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume
132
Voted
IDEAS
2007
IEEE
144views Database» more  IDEAS 2007»
15 years 10 months ago
An Extensible and Personalized Approach to QoS-enabled Service Discovery
We present an extensible and customizable framework for the autonomous discovery of Semantic Web services based on their QoS properties. Using semantic technologies, users can spe...
Le-Hung Vu, Fabio Porto, Karl Aberer, Manfred Haus...
IPCCC
2006
IEEE
15 years 9 months ago
Automatically deducing propagation sequences that circumvent a collaborative worm defense
We present an approach to the question of evaluating worm defenses against future, yet unseen and possibly defense-aware worm behavior. Our scheme employs model checking to produc...
Linda Briesemeister, Phillip A. Porras