Sciweavers

462 search results - page 69 / 93
» Characterization-Free Behavioral Power Modeling
Sort
View
WISTP
2010
Springer
15 years 4 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
ICIW
2009
IEEE
15 years 4 months ago
Enhancing IMS LD Units of Learning Comprehension
IMS Learning Design (IMS LD) is a powerful and expressive educational modeling language, which is becoming a “de facto” encoding and interchange standard for activity-based co...
Iván Martínez-Ortiz, José Lui...
ICPR
2010
IEEE
15 years 4 months ago
Canonical Patterns of Oriented Topologies
—A common problem in many areas of behavioral research is the analysis of the large volume of data recorded during the execution of the tasks being studied. Recent work has propo...
Walter Mankowski, Ali Shokoufandeh, Dario Salvucci
70
Voted
OOPSLA
2009
Springer
15 years 4 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
CSFW
2007
IEEE
15 years 3 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...