Sciweavers

1753 search results - page 263 / 351
» State Machines
Sort
View
83
Voted
COMPSAC
2005
IEEE
15 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
CRV
2005
IEEE
198views Robotics» more  CRV 2005»
15 years 3 months ago
Analysis of Player Actions in Selected Hockey Game Situations
We present a proof of concept system to represent and reason about hockey play. The system takes as input player motion trajectory data tracked from game video and supported by kn...
Fahong Li, Robert J. Woodham
EUROMICRO
2005
IEEE
15 years 3 months ago
The Audition Framework for Testing Web Services Interoperability
Service Oriented Architectures and Web Services are emerging technologies, which have overall inherited problems and advantages from the component-based approach, but exacerbated ...
Antonia Bertolino, Andrea Polini
INFOCOM
2005
IEEE
15 years 3 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
ITCC
2005
IEEE
15 years 3 months ago
Disciplined Methods of Software Specification: A Case Study
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...