Sciweavers

1486 search results - page 249 / 298
» Firewall Rules Analysis
Sort
View
ER
2001
Springer
163views Database» more  ER 2001»
15 years 4 months ago
Towards Ontologically Based Semantics for UML Constructs
Abstract. Conceptual models are formal descriptions of application domains that are used in early stages of system development to support requirements analysis. The Unified Modeli...
Joerg Evermann, Yair Wand
ISEC
2001
Springer
180views ECommerce» more  ISEC 2001»
15 years 4 months ago
i-Cube: A Tool-Set for the Dynamic Extraction and Integration of Web Data Content
Over the past decade the Internet has evolved into the largest public community in the world. It provides a wealth of data content and services in almost every field of science, t...
Frankie Poon, Kostas Kontogiannis
ICPR
2000
IEEE
15 years 4 months ago
Automatic Genre Identification for Content-Based Video Categorization
Thispaper presents a set of computationalfeatures originatingfrom our study of editing effects, motion, and color used in videos,for the task of automatic video categorization. Th...
Ba Tu Truong, Svetha Venkatesh, Chitra Dorai
INFOCOM
2000
IEEE
15 years 4 months ago
Stochastic Modeling of TCP over Lossy Links
—An analytical framework for modeling the performance of a single TCP session in the presence of random packet loss is presented. A Markovian approach is developed that allows us...
Alhussein A. Abouzeid, Sumit Roy, Murat Azizoglu
LICS
1999
IEEE
15 years 4 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson