Sciweavers

1486 search results - page 72 / 298
» Firewall Rules Analysis
Sort
View
COMPSAC
2008
IEEE
15 years 6 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
INTERACTION
2009
ACM
15 years 6 months ago
Temporal-spatial association analysis of ocean salinity and temperature variations
Ocean circulation plays an important role in global climate change. In an effort to monitor ocean circulation an infrastructure of more than 3,000 buoys have been deployed in the ...
Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes
MLG
2007
Springer
15 years 6 months ago
Weighted Substructure Mining for Image Analysis
1 In web-related applications of image categorization, it is desirable to derive an interpretable classification rule with high accuracy. Using the bag-of-words representation and...
Sebastian Nowozin, Koji Tsuda, Takeaki Uno, Taku K...
SEMWEB
2004
Springer
15 years 5 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
CCS
2010
ACM
15 years 1 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...