Sciweavers

30 search results - page 5 / 6
» Security Rules Specification and Analysis Based on Passive T...
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
DILS
2006
Springer
13 years 9 months ago
A Method for Similarity-Based Grouping of Biological Data
Similarity-based grouping of data entries in one or more data sources is a task underlying many different data management tasks, such as, structuring search results, removal of red...
Vaida Jakoniene, David Rundqvist, Patrick Lambrix
FLAIRS
2006
13 years 6 months ago
The ASSISTment Builder: Towards an Analysis of Cost Effectiveness of ITS Creation
Intelligent Tutoring Systems, while effective at producing student learning [2,7], are notoriously costly to construct [1,9], and require PhD level experience in cognitive science...
Neil T. Heffernan, Terrence E. Turner, Abraao L. N...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
13 years 9 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
IJDAR
2007
69views more  IJDAR 2007»
13 years 5 months ago
User-driven page layout analysis of historical printed books
In this paper, based on the study of the specificity of historical printed books, we first explain the main error sources in classical methods used for page layout analysis. We sho...
Jean-Yves Ramel, S. Leriche, M. L. Demonet, S. Bus...