Sciweavers

1941 search results - page 352 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
LCN
2007
IEEE
15 years 6 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
NSPW
2004
ACM
15 years 5 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
BILDMED
2007
148views Algorithms» more  BILDMED 2007»
15 years 1 months ago
Complete Digital Iconic and Textual Annotation for Mammography
This work aims to propose an interactive method for a iconic and textual annotation of digital mammograms. The suggested annotation tool consists of a semantic network to represent...
Thomas Wittenberg, Matthias Elter, Rüdiger Sc...
ICHIM
2001
139views more  ICHIM 2001»
15 years 1 months ago
Automated 3D Recording of Archaeological Pottery
At excavations a large number of sherds of archaeological pottery is found. Since the documentation and administration of these fragments represent a temporal and personnel effort...
Martin Kampel, Robert Sablatnig
KBSE
2010
IEEE
14 years 10 months ago
A program differencing algorithm for verilog HDL
During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because existing p...
Adam Duley, Chris Spandikow, Miryung Kim