Sciweavers

1737 search results - page 133 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SPIN
2009
Springer
15 years 11 months ago
Subsumer-First: Steering Symbolic Reachability Analysis
Abstract. Symbolic reachability analysis provides a basis for the verification of software systems by offering algorithmic support for the exploration of the program state space ...
Andrey Rybalchenko, Rishabh Singh
ICDCSW
2007
IEEE
15 years 11 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
ISI
2004
Springer
15 years 10 months ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
SCS
2001
15 years 6 months ago
High Level Failure Analysis for Integrated Modular Avionics
Integrated Modular Avionics (IMA) is the term used for a common computer network aboard an aircraft. In order to gain full benefit from this technology a strategy is required to a...
Philippa Conmy, John A. McDermid