Sciweavers

2424 search results - page 263 / 485
» A general algorithm for data dependence analysis
Sort
View
SPIN
2009
Springer
15 years 10 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
PEPM
2007
ACM
15 years 10 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
ESORICS
2004
Springer
15 years 9 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
CAIP
2003
Springer
247views Image Analysis» more  CAIP 2003»
15 years 7 months ago
Object Classification and Tracking in Video Surveillance
The design of a video surveillance system is directed on automatic identification of events of interest, especially on tracking and classification of moving vehicles or pedestrian...
Qi Zang, Reinhard Klette
RECSYS
2009
ACM
15 years 10 months ago
Context-based splitting of item ratings in collaborative filtering
Collaborative Filtering (CF) recommendations are computed by leveraging a historical data set of users’ ratings for items. It assumes that the users’ previously recorded ratin...
Linas Baltrunas, Francesco Ricci