Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Intelligence and Security Informatics

    IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings

    Christopher C. Yang, Hsinchun Chen in Lecture Notes in Computer Science (2008)

  2. No Access

    Chapter and Conference Paper

    Locality-Based Server Profiling for Intrusion Detection

    Detection of intrusion on network servers plays an ever more important role in network security. This paper investigates whether analysis of incoming connection behavior for properties of locality can be used ...

    Robert Lee, Sheau-Dong Lang in Intelligence and Security Informatics (2008)

  3. No Access

    Chapter and Conference Paper

    Forensic Artifacts of Microsoft Windows Vista System

    This paper reviews changes made to Microsoft Windows Vista system from earlier Windows operating system (such as XP) and directs attention to system artifacts that are of evidentiary values in typical computer...

    Daniel M. Purcell, Sheau-Dong Lang in Intelligence and Security Informatics (2008)

  4. No Access

    Article

    Using Constraint Logic Programming to Analyze theChronology in ``A Rose for Emily''

    William Faulkner's non-chronological story tellingstyle has long been a challenge to critics and apuzzle to beginning literature students. ``A Rose forEmily,'' one of Faulkner's most frequently anthologizedsto...

    Jennifer Burg, Anne Boyle, Sheau-Dong Lang in Computers and the Humanities (2000)

  5. No Access

    Article

    Intelligent backtracking in CLP(ℜ)

    CLP(ℜ) is a constraint logic programming language in which constraints can be expressed in the domain of real numbers. Computation in this specialized domain gives access to information useful in intelligent b...

    Jennifer J. Burg, Sheau-Dong Lang in Annals of Mathematics and Artificial Intel… (1996)