Sciweavers

2265 search results - page 198 / 453
» Recovering Exchanged Data
Sort
View
ICAPR
2005
Springer
15 years 9 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
SPW
2005
Springer
15 years 9 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 9 months ago
Static Analysis of XSLT Programs
XML is becoming the dominant standard for representing and exchanging data on the World Wide Web. The ability to transform and present data in XML is crucial and XSLT (Extensible ...
Ce Dong, James Bailey
IDEAL
2004
Springer
15 years 9 months ago
Summarizing Time Series: Learning Patterns in 'Volatile' Series
Most financial time series processes are nonstationary and their frequency characteristics are time-dependant. In this paper we present a time series summarization and prediction ...
Saif Ahmad, Tugba Taskaya-Temizel, Khurshid Ahmad
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 9 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell