Sciweavers

2674 search results - page 194 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
128
Voted
ICSM
2003
IEEE
15 years 9 months ago
On Modeling Software Architecture Recovery as Graph Matching
This paper presents a graph matching model for the software architecture recovery problem. Because of their expressiveness, the graphs have been widely used for representing both ...
Kamran Sartipi, Kostas Kontogiannis
RAID
2001
Springer
15 years 8 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
114
Voted
CHI
2003
ACM
15 years 9 months ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
CASSIS
2005
Springer
15 years 9 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
163
Voted
VRML
1998
ACM
15 years 8 months ago
Using VRML as an Interface to the 3D Data Warehouse
In its current state, VRML does not provide support for interaction and on-line access to databases, even though these are two fundamental issues for business applications. We hav...
Volker Coors, Volker Jung