Sciweavers

551 search results - page 61 / 111
» The Complexity of Andersen's Analysis in Practice
Sort
View
JNSM
2008
93views more  JNSM 2008»
14 years 11 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
AI
2000
Springer
14 years 11 months ago
On agent-based software engineering
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly impro...
Nicholas R. Jennings
JCSS
2010
111views more  JCSS 2010»
14 years 10 months ago
Reduction rules for reset/inhibitor nets
Abstract. Reset/inhibitor nets are Petri nets extended with reset arcs and inhibitor arcs. A reset arc allows a transition to remove all tokens from a certain place when the transi...
H. M. W. Verbeek, Moe Thandar Wynn, Wil M. P. van ...
DAC
2002
ACM
16 years 24 days ago
Schedulability of event-driven code blocks in real-time embedded systems
Many real-time embedded systems involve a collection of independently executing event-driven code blocks, having hard real-time constraints. Tasks in many such systems, like netwo...
Samarjit Chakraborty, Thomas Erlebach, Simon K&uum...
CBMS
2008
IEEE
15 years 6 months ago
Semantic Visualization of Patient Information
Clinical practice and research rely increasingly on analytic approaches to patient data. Visualization enables the comparative exploration of similar patients, a key requirement i...
Sonja Zillner, Tamas Hauer, Dmitri Rogulin, Alexey...