Sciweavers

1587 search results - page 164 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
151
Voted
ICNP
2006
IEEE
15 years 11 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
133
Voted
SACMAT
2003
ACM
15 years 10 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
149
Voted
AGENTS
2001
Springer
15 years 9 months ago
CMPack: a complete software system for autonomous legged soccer robots
This paper describes a completely implemented, fully autonomous software system for soccer playing quadruped robots. The system includes real-time color vision, probabilistic loca...
Scott Lenser, James Bruce, Manuela M. Veloso
135
Voted
EURODAC
1994
IEEE
124views VHDL» more  EURODAC 1994»
15 years 9 months ago
Automotive databus simulation using VHDL
developed and standardised, for example CAN[1][2], J1850[3]. THE ELECTRONIC VEHICLE TODAYVHDL has been used to develop a simulator for automotive databus networks. This is a design...
Karen Hale
134
Voted
OOPSLA
2007
Springer
15 years 11 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu