Sciweavers

2248 search results - page 401 / 450
» Using Bayesian networks to analyze expression data
Sort
View
DSN
2011
IEEE
13 years 11 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
WWW
2008
ACM
16 years 14 days ago
Automatically refining the wikipedia infobox ontology
The combined efforts of human volunteers have recently extracted numerous facts from Wikipedia, storing them as machine-harvestable object-attribute-value triples in Wikipedia inf...
Fei Wu, Daniel S. Weld
CSFW
2008
IEEE
15 years 6 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
FPL
2003
Springer
100views Hardware» more  FPL 2003»
15 years 5 months ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...
MM
1999
ACM
176views Multimedia» more  MM 1999»
15 years 4 months ago
Modeling focus of attention for meeting indexing
—A user’s focus of attention plays an important role in human–computer interaction applications, such as a ubiquitous computing environment and intelligent space, where the u...
Rainer Stiefelhagen, Jie Yang, Alex Waibel