Sciweavers

4211 search results - page 673 / 843
» Types as Abstract Interpretations
Sort
View
231
Voted
ISICA
2009
Springer
15 years 11 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
ISW
2009
Springer
15 years 11 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
159
Voted
KIVS
2009
Springer
15 years 11 months ago
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems
Abstract. In peer-to-peer based live streaming systems, a great number of participants have to cooperate to efficiently and reliably distribute a continuous flow of data. Each rec...
Michael Brinkmeier, Mathias Fischer, Sascha Grau, ...
MIDDLEWARE
2009
Springer
15 years 11 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
MIG
2009
Springer
15 years 11 months ago
A Semantic Navigation Model for Video Games
Abstract. Navigational performance of artificial intelligence (AI) characters in computer games is gaining an increasingly important role in the perception of their behavior. Whil...
Leonard van Driel, Rafael Bidarra