Sciweavers

1018 search results - page 46 / 204
» Building the Biodiversity Commons
Sort
View
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 4 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICPP
1993
IEEE
15 years 4 months ago
Data-Parallel R-Tree Algorithms
Abstract Data-parallel algorithms for R-trees, a common spatial data structure are presented, in the domain of planar line segment data e.g., Bureau of the Census TIGER Line les....
Erik G. Hoel, Hanan Samet
IUI
1993
ACM
15 years 3 months ago
The study of models of intelligent interfaces
Researchers in the field of intelligent interfaces have concentrated on building architectures, and have placed little emphasis on defining appropriate models. As a result, this...
Angel R. Puerta
DATE
2004
IEEE
149views Hardware» more  DATE 2004»
15 years 3 months ago
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation
This paper describes a novel design methodology to implement a secure DPA resistant crypto processor. The methodology is suitable for integration in a common automated standard ce...
Kris Tiri, Ingrid Verbauwhede
PROFES
2000
Springer
15 years 3 months ago
LIDs: A Light-Weight Approach to Experience Elicitation and Reuse
Building common ontologies, setting up measurement programs, and conducting interviews are valid techniques to start eliciting knowledge and experience for later reuse. However, th...
Kurt Schneider