Sciweavers

407 search results - page 81 / 82
» A Framework for the Evaluation of Intrusion Detection System...
Sort
View
CHI
2004
ACM
14 years 6 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
WWW
2010
ACM
14 years 17 days ago
DSNotify: handling broken links in the web of data
The Web of Data has emerged as a way of exposing structured linked data on the Web. It builds on the central building blocks of the Web (URIs, HTTP) and benefits from its simplic...
Niko Popitsch, Bernhard Haslhofer
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
13 years 11 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
IPPS
2008
IEEE
14 years 9 hour ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
CVPR
2008
IEEE
14 years 7 months ago
Automatic non-rigid registration of 3D dynamic data for facial expression synthesis and transfer
Automatic non-rigid registration of 3D time-varying data is fundamental in many vision and graphics applications such as facial expression analysis, synthesis, and recognition. De...
Sen Wang, Xianfeng David Gu, Hong Qin