Sciweavers

578 search results - page 95 / 116
» Analysis of Programs with Exception-Handling Constructs
Sort
View
109
Voted
RAID
2007
Springer
15 years 6 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
COLT
2005
Springer
15 years 6 months ago
Martingale Boosting
In recent work Long and Servedio [LS05] presented a “martingale boosting” algorithm that works by constructing a branching program over weak classifiers and has a simple anal...
Philip M. Long, Rocco A. Servedio
108
Voted
ICALP
2004
Springer
15 years 5 months ago
A Domain Theoretic Account of Picard's Theorem
We present a domain-theoretic version of Picard’s theorem for solving classical initial value problems in Rn . For the case of vector fields that satisfy a Lipschitz condition, ...
Abbas Edalat, Dirk Pattinson
77
Voted
HT
2000
ACM
15 years 4 months ago
Making a successful case for a hypertextual doctoral dissertation
In August of 1998 I completed the first hypertextual dissertation at Rensselaer Polytechnic Institute. The dissertation was a case study applying methods of rhetorical analysis an...
Christine Boese
118
Voted
BIRTHDAY
2003
Springer
15 years 4 months ago
Aspect Validation Using Model Checking
Aspects are intended to add needed functionality to a system or to treat concerns of the system by augmenting or changing the existing code in a manner that cross-cuts the usual c...
Shmuel Katz, Marcelo Sihman