Sciweavers

1486 search results - page 105 / 298
» Firewall Rules Analysis
Sort
View
145
Voted
KES
2005
Springer
15 years 9 months ago
Analysis of Parity Assignment Steganography in Palette Images
Abstract. In parity assignment-based steganography for palette images, all colors in a host image are divided into two subsets, and each pixel is used to carry one secret bit. This...
Xinpeng Zhang, Shuozhong Wang
CSFW
2000
IEEE
15 years 8 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
126
Voted
SIGSOFT
1998
ACM
15 years 8 months ago
Formal Modeling and Analysis of the HLA Component Integration Standard
An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards de ne rules of interaction and shared commun...
Robert Allen, David Garlan
131
Voted
CIA
2006
Springer
15 years 7 months ago
Agent-Based Analysis and Support for Incident Management
This paper presents an agent-based approach for error detection in incident management organizations. The approach consists of several parts. First, a formal approach for the speci...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur, ...
CEC
2003
IEEE
15 years 7 months ago
Playing in continuous spaces: some analysis and extension of population-based incremental learning
- As an alternative to traditional Evolutionary Algorithms (EAs), Population-Based Incremental Learning (PBIL) maintains a probabilistic model of the best individual(s). Originally...
Bo Yuan, Marcus Gallagher