Sciweavers

2878 search results - page 328 / 576
» Model Checking FTA
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
15 years 2 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
ICIP
2009
IEEE
15 years 2 months ago
Multichannel dual domain infrared target tracking for highly evolutionary target signatures
We introduce a new SIR particle filter that performs tracking in a joint feature space where pixel domain data are fused with measurements obtained from an 18-channel modulation d...
Colin M. Johnston, Nick A. Mould, Joseph P. Havlic...
176
Voted
ICOODB
2009
246views Database» more  ICOODB 2009»
15 years 2 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 7 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou