Sciweavers

4166 search results - page 693 / 834
» Automating the constraining process
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
137
Voted
ASAP
2005
IEEE
133views Hardware» more  ASAP 2005»
15 years 9 months ago
Speedups from Partitioning Critical Software Parts to Coarse-Grain Reconfigurable Hardware
In this paper, we propose a hardware/software partitioning method for improving applications’ performance in embedded systems. Critical software parts are accelerated on hardwar...
Michalis D. Galanis, Grigoris Dimitroulakos, Costa...
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
15 years 9 months ago
MobCon: A Generative Middleware Framework for Java Mobile Applications
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Vasian Cepa, Mira Mezini
ICDCS
2005
IEEE
15 years 9 months ago
Supporting Live Development of SOAP and CORBA Servers
We present middleware for a Server Development Environment that facilitates live development of SOAP and CORBA servers. As the underlying implementation platform, we use JPie, a t...
Sajeeva L. Pallemulle, Kenneth J. Goldman, Brandon...
ICMCS
2005
IEEE
108views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Analysis and Retrieval of Paintings Using Artistic Color Concepts
Traditionally artistic color concepts play an important role in the analysis of artworks, and provide valuable domain knowledge to guide the analysis and accurate retrieval of pai...
Yelizaveta Marchenko, Tat-Seng Chua, Irina Aristar...