Sciweavers

56 search results - page 11 / 12
» Complete Monitors for Behavioral Contracts
Sort
View
TMI
2011
144views more  TMI 2011»
13 years 14 days ago
Automated Mitosis Detection of Stem Cell Populations in Phase-Contrast Microscopy Images
—Due to the enormous potential and impact that stem cells may have on regenerative medicine, there has been a rapidly growing interest for tools to analyze and characterize the b...
Seungil Huh, Dai Fei E. Ker, Ryoma Bise, Mei Chen,...
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
14 years 6 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
CCS
2009
ACM
14 years 10 days ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
ACISP
2009
Springer
13 years 10 months ago
Measurement Study on Malicious Web Servers in the .nz Domain
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete contro...
Christian Seifert, Vipul Delwadia, Peter Komisarcz...
ICFP
2008
ACM
14 years 5 months ago
A functional model-view-controller software architecture for command-oriented programs
Command-oriented functional programs are currently structured in an ad hoc way that makes the development of multiple userinterfaces difficult and error prone, and makes it diffic...
Alley Stoughton