Sciweavers

2330 search results - page 249 / 466
» A System for Object Class Detection
Sort
View
MOBIHOC
2010
ACM
15 years 3 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
129
Voted
RAID
2004
Springer
15 years 10 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 5 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
VL
2009
IEEE
128views Visual Languages» more  VL 2009»
15 years 11 months ago
Improving API documentation using API usage information
Jadeite is a new Javadoc-like API documentation system that takes advantage of multiple users’ aggregate experience to reduce difficulties that programmers have learning new API...
Jeffrey Stylos, Andrew Faulring, Zizhuang Yang, Br...
ICFP
1999
ACM
15 years 9 months ago
Type Dispatch for Named Hierarchical Types
Type dispatch constructs are an important feature of many programming languages. Scheme has predicates for testing the runtime type of a value. Java has a class cast expression an...
Neal Glew