-
1
-
-
0000110392
-
An Implementation of Karmarkar's Algorithm for Linear Programming
-
Adler I et al (1989) An Implementation of Karmarkar's Algorithm for Linear Programming. Mathematical Programming, 44: 297-335
-
(1989)
Mathematical Programming
, vol.44
, pp. 297-335
-
-
Adler, I.1
-
2
-
-
77950960263
-
-
Managing Cyber Threats: Issues, Approaches and Challenges, In: Kumar V, Srivastava J, Lazarevic A (eds), Springer, ISBN 0387242260
-
Lazarevic A, Kumar V, Srivastava J (2006) Intrusion Detection: A Survey. Massive Computing, In: Kumar V, Srivastava J, Lazarevic A (eds), Managing Cyber Threats: Issues, Approaches and Challenges, Springer, ISBN 0387242260
-
(2006)
Intrusion Detection: A Survey. Massive Computing
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
3
-
-
84882771540
-
Realising the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges
-
In: Spanoudakis G, Maña A, Kokolakis S (eds), Information Security Series, Springer
-
Armenteros A, Garcia L, Muñoz A, Maña A (2008) Realising the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges. In: Spanoudakis G, Maña A, Kokolakis S (eds) Security and Dependability for Ambient Intelligence, Information Security Series, Springer
-
(2008)
Security and Dependability For Ambient Intelligence
-
-
Armenteros, A.1
Garcia, L.2
Muñoz, A.3
Maña, A.4
-
9
-
-
18944375047
-
Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation
-
Elsevier Science B.V
-
Chen F, Rosu G (2003) Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation. In Electronic Notes in Theoretical Computer Science, 89(2), Elsevier Science B.V.
-
(2003)
Electronic Notes In Theoretical Computer Science
, vol.89
, Issue.2
-
-
Chen, F.1
Rosu, G.2
-
11
-
-
33947673913
-
Linear programming and the simplex method
-
Gale D (2007) Linear programming and the simplex method. Notices of the AMS, 54(3):364-369.
-
(2007)
Notices of the AMS
, vol.54
, Issue.3
, pp. 364-369
-
-
Gale, D.1
-
12
-
-
84889855905
-
Runtime Monitoring in Service Oriented Architectures
-
In: Baresi L and di Nitto E. (eds), Springer, 2007
-
Ghezzi C, Guinea S (2007) Runtime Monitoring in Service Oriented Architectures. In: Baresi L and di Nitto E. (eds), Test and Analysis of Web Services, Springer, 237-264, 2007.
-
(2007)
Test and Analysis of Web Services
, pp. 237-264
-
-
Ghezzi, C.1
Guinea, S.2
-
14
-
-
11144354549
-
An Overview of the Runtime Verification Tool Java PathExplorer
-
Havelund K, Roşu G (2004) An Overview of the Runtime Verification Tool Java PathExplorer. Form. Methods Syst. Des. 24, 189-215.
-
(2004)
Form. Methods Syst. Des
, vol.24
, pp. 189-215
-
-
Havelund, K.1
Roşu, G.2
-
17
-
-
84882749797
-
-
Deliverable A4.D3.2, SERENITY Project, Accessed 9 December 2008
-
Kloukinas C, Mahbub K, Spanoudakis G (2007) Evaluation of V1 of Dynamic Validation Prototype, Deliverable A4.D3.2, SERENITY Project, http://www.serenityforum.org/IMG/pdf/A4.D3.2_Evaluation_of_v1_of_dynamic_validation_prototype_v.-2.pdf, Accessed 9 December 2008
-
(2007)
Evaluation of V1 of Dynamic Validation Prototype
-
-
Kloukinas, C.1
Mahbub, K.2
Spanoudakis, G.3
-
20
-
-
84882754137
-
-
Deliverable A4.D3.3, SERENITY Project, Accessed 9 December 2008
-
Mahbub K, Spanoudakis G, Kloukinas C, (2007). V2 of dynamic validation prototype. Deliverable A4.D3.3, SERENITY Project, http://www.serenity-forum.org/IMG/pdf/A4.D3.3_-_V2_of_Dynamic_validation_Prototype.pdf. Accessed 9 December 2008
-
(2007)
V2 of Dynamic Validation Prototype
-
-
Mahbub, K.1
Spanoudakis, G.2
Kloukinas, C.3
-
21
-
-
84889872804
-
Monitoring WS-Agreements: An Event Calculus Based Approach
-
In: Baresi L, and di Nitto E (eds), Springer
-
Mahbub K, Spanoudakis G (2007) Monitoring WS-Agreements: An Event Calculus Based Approach. In: Baresi L, and di Nitto E (eds), Test and Analysis of Web Services, Springer
-
(2007)
Test and Analysis of Web Services
-
-
Mahbub, K.1
Spanoudakis, G.2
-
23
-
-
84882768394
-
-
NTP, Accessed on 9 December
-
NTP, www.ntp.org, Accessed on 9 December 2008
-
(2008)
-
-
-
26
-
-
79960071941
-
-
MSc. Thesis, Department of Electrical & Computer Engineering, University of Alberta
-
Li Q (2007) A Dynamic Verification Platform for BPEL Environments. MSc. Thesis, Department of Electrical & Computer Engineering, University of Alberta
-
(2007)
A Dynamic Verification Platform For BPEL Environments
-
-
Li, Q.1
-
27
-
-
1642497296
-
The event calculus explained
-
Volume 1600 of Lecture Notes in Artificial Intelligence. (1999
-
Shanahan M.P. (1999) The event calculus explained. In: Artificial Intelligence Today. Volume 1600 of Lecture Notes in Artificial Intelligence. (1999) 409-430
-
(1999)
Artificial Intelligence Today
, pp. 409-430
-
-
Shanahan, M.P.1
-
28
-
-
84882768753
-
-
SNORT Intrusion Detection System, Accessed 9 December 2008
-
SNORT Intrusion Detection System, www.snort.org, 2004. Accessed 9 December 2008
-
(2004)
-
-
-
29
-
-
35248860217
-
Towards security monitoring patterns
-
Seoul, Korea
-
Spanoudakis G, Kloukinas C, Androutsopoulos K.(2007) Towards security monitoring patterns. Proceedings of ACM Symposium on Applied Computing (SAC07)-Track on Software Verification, Volume 2, Seoul, Korea, 1518-1525
-
(2007)
Proceedings of ACM Symposium On Applied Computing (SAC07)-Track On Software Verification
, vol.2
, pp. 1518-1525
-
-
Spanoudakis, G.1
Kloukinas, C.2
Androutsopoulos, K.3
-
31
-
-
33646449540
-
-
IETF, Accessed on 9 December 2008
-
Staniford-Chen S, Tung B, Porras P, Kahn C, Schnackenberg D, Feiertag R, Stillman M (1998) The Common Intrusion Detection Framework-Data Formats. IETF, www.watersprings.org/pub/id/draft-staniford-cidf-data-formats-00.txt, Accessed on 9 December 2008
-
(1998)
The Common Intrusion Detection Framework-Data Formats
-
-
Staniford-Chen, S.1
Tung, B.2
Porras, P.3
Kahn, C.4
Schnackenberg, D.5
Feiertag, R.6
Stillman, M.7
-
32
-
-
49049104267
-
Automated System Monitoring and Notification With Swatch
-
Monterey, California, USA, 1993
-
th USENIX conference on System administration, Monterey, California, USA, 1993
-
(1993)
th USENIX Conference On System Administration
-
-
Stephen, E.1
Hansen, E.2
Atkins, T.3
-
33
-
-
84882803442
-
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
-
In Spanoudakis G, Maña A, and Kokolakis S (eds), Information Security Series, Springer
-
Tsigritis T, Spanoudakis G, Kloukinas C, Lorenzoli D (2009) Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework. In Spanoudakis G, Maña A, and Kokolakis S (eds), Security and Dependability for Ambient Intelligence, Information Security Series, Springer
-
(2009)
Security and Dependability For Ambient Intelligence
-
-
Tsigritis, T.1
Spanoudakis, G.2
Kloukinas, C.3
Lorenzoli, D.4
|