Sciweavers

3424 search results - page 461 / 685
» Building Diverse Computer Systems
Sort
View
IFIPTCS
2010
15 years 2 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
RAID
2010
Springer
15 years 2 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
GI
2009
Springer
15 years 2 months ago
Control and safety architecture for a modular medical robot
: In this paper a new approach for a control and safety architecture for a modular task adaptable medical robot is described. The concept has been evaluated with the MINARO robot, ...
Alexander Korff, Martin Niggemeyer, Matías ...
146
Voted
INTERSPEECH
2010
14 years 11 months ago
Text normalization based on statistical machine translation and internet user support
In this paper, we describe and compare systems for text normalization based on statistical machine translation (SMT) methods which are constructed with the support of internet use...
Tim Schlippe, Chenfei Zhu, Jan Gebhardt, Tanja Sch...
SIGCSE
2004
ACM
141views Education» more  SIGCSE 2004»
15 years 10 months ago
Running on the bare metal with GeekOS
Undergraduate operating systems courses are generally taught e of two approaches: abstract or concrete. In the approach, students learn the concepts underlying operating systems t...
David Hovemeyer, Jeffrey K. Hollingsworth, Bobby B...