Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
INFOCOM
2011
IEEE
10 years 8 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
SIGDIAL
2010
11 years 3 months ago
Exploring the Effectiveness of Lexical Ontologies for Modeling Temporal Relations with Markov Logic
Temporal analysis of events is a central problem in computational models of discourse. However, correctly recognizing temporal aspects of events poses serious challenges. This pap...
Eun Y. Ha, Alok Baikadi, Carlyle Licata, Bradford ...
DAC
1995
ACM
11 years 9 months ago
Automatic Clock Abstraction from Sequential Circuits
Our goal is to transform a low-level circuit design into a more representation. A pre-existing tool, Tranalyze [4], takes a switch-level circuit and generates a functionally equiv...
Samir Jain, Randal E. Bryant, Alok Jain
SADFE
2007
IEEE
11 years 11 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
books