Sciweavers

1709 search results - page 306 / 342
» networking 2000
Sort
View
COMPULOG
1999
Springer
15 years 2 months ago
Decomposable Constraints
Many constraint satisfaction problems can be naturally and efficiently modelled using non-binary constraints like the “all-different” and “global cardinality” constraints...
Ian P. Gent, Kostas Stergiou, Toby Walsh
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 1 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
ACSAC
2001
IEEE
15 years 1 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
AI
2003
Springer
15 years 1 months ago
The Importance of Fine-Grained Cue Phrases in Scientific Citations
Abstract. Scientific citations play a crucial role in maintaining the network of relationships among mutually relevant articles within a research field. Customarily, authors includ...
Robert E. Mercer, Chrysanne DiMarco
80
Voted
CSFW
2000
IEEE
15 years 1 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi