Sciweavers

1486 search results - page 138 / 298
» Firewall Rules Analysis
Sort
View
OOPSLA
2005
Springer
15 years 10 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
RAID
2004
Springer
15 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
MM
2003
ACM
205views Multimedia» more  MM 2003»
15 years 9 months ago
AVE: automated home video editing
In this paper, we present a system that automates home video editing. This system automatically extracts a set of highlight segments from a set of raw home videos and aligns them ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
DAS
2008
Springer
15 years 6 months ago
An Efficient Edge Based Technique for Text Detection in Video Frames
Both graphic text and scene text detection in video images with complex background and low resolution is still a challenging and interesting problem for researchers in the field o...
Palaiahnakote Shivakumara, Weihua Huang, Chew Lim ...
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
16 years 4 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi