Sciweavers

4511 search results - page 556 / 903
» Observation Based System Security
Sort
View
DSN
2009
IEEE
15 years 2 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
CISS
2010
IEEE
14 years 8 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
OOPSLA
2005
Springer
15 years 10 months ago
Inferring context-free grammars for domain-specific languages
Grammatical inference (or grammar inference) has been applied to various problems in areas such as computational biology, and speech and pattern recognition but its application to...
Faizan Javed
IADIS
2003
15 years 6 months ago
Moda-Ml, an Interoperability Framework for the Textile-Clothing Sector
The MODA-ML project aims to enhance the interoperability between enterprises in the Textile/Clothing sector defining a common interchange language based on a set of XML business c...
Nicola Gessa, Fabio Vitali, Guido Cucchiara, Piero...
CSI
2007
54views more  CSI 2007»
15 years 4 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao