Sciweavers

3516 search results - page 522 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SIGMOD
1997
ACM
100views Database» more  SIGMOD 1997»
15 years 8 months ago
MDM: a Multiple-Data-Model Tool for the Management of Heterogeneous Database Schemes
MDM is a tool that enables the users to de ne schemes of di erent data models and to perform translations of schemes from one model to another. These functionalities can be at the...
Paolo Atzeni, Riccardo Torlone
RECSYS
2009
ACM
15 years 9 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
DDEP
2000
Springer
15 years 8 months ago
Context-Aware Digital Documents Described in a High-Level Petri Net-Based Hypermedia System
As mobile computing becomes widespread, so will the need for digital document delivery by hypertextual means. A further trend will be the provision of the ability for devices to de...
Jin-Cheon Na, Richard Furuta
ASE
1999
126views more  ASE 1999»
15 years 3 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...
IAT
2007
IEEE
15 years 10 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...