Sciweavers

733 search results - page 72 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
CISIS
2009
IEEE
15 years 6 months ago
A Nonmonotonic Logical Approach for Modelling and Revising Metabolic Networks
—This paper describes a new logic-based approach for representing and reasoning about metabolic networks. First it shows how biological pathways can be elegantly represented in a...
Oliver Ray, Ken E. Whelan, Ross D. King
SYNASC
2008
IEEE
284views Algorithms» more  SYNASC 2008»
15 years 6 months ago
Graph Rewriting in Computational Origami
We formalize paper fold (origami) by graph rewriting. Origami tion is abstractly described by a rewrite system (O, ), where set of abstract origami’s and is a binary relation on ...
Tetsuo Ida
ISSTA
2012
ACM
13 years 2 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
ENTCS
2006
172views more  ENTCS 2006»
14 years 12 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
ICDCS
2009
IEEE
15 years 9 months ago
Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems
With the growing complexity in computer systems, it has been a real challenge to detect and diagnose problems in today’s large-scale distributed systems. Usually, the correlatio...
Jing Gao, Guofei Jiang, Haifeng Chen, Jiawei Han