Sciweavers

2209 search results - page 274 / 442
» Language Based Secure Communication
Sort
View
163
Voted
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
15 years 2 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
128
Voted
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
15 years 9 months ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith
138
Voted
IFIP
2004
Springer
15 years 9 months ago
Safety assessment with AltaRica
: AIRBUS and ONERA used the AltaRica formal language and associated tools to perform safety assessments. Lessons learnt during the study of an electrical and hydraulic system are p...
Pierre Bieber, Christian Bougnol, Charles Castel, ...
133
Voted
ISUVR
2007
15 years 5 months ago
A Study on the Expression of Emotions using Lights in Apparel Types
— When types of communication between people are observed, one can see that communication not only consist of words but also, contextual communication consist of facial expressio...
Yongsoon Choi, JuYong Kim, JaeKi Kyoun, Duk Hyun, ...
107
Voted
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 3 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari