Sciweavers

29046 search results - page 203 / 5810
» Computable Models
Sort
View
140
Voted
ISMIS
2005
Springer
15 years 9 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
112
Voted
IPPS
1998
IEEE
15 years 7 months ago
High-Performance External Computations Using User-Controllable I/O
The UPIO (User-controllable Parallel I/O) we proposed xtends the abstraction of a linear file model into an n-dimensional file model, making it possible to control the layout of d...
Jang Sun Lee, Sung Hoon Ko, Sanjay Ranka, Byung Eu...

Book
385views
17 years 2 months ago
3D Model Recognition From Stereoscopic Cues
A classic computer vision book.
J.E. W. Mayhew, J.P. Frisby
116
Voted
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 3 months ago
Computer algebra in systems biology
Systems biology focuses on the study of entire biological systems rather than on their individual components. With the emergence of high-throughput data generation technologies for...
Reinhard C. Laubenbacher, Bernd Sturmfels
CSFW
2008
IEEE
15 years 10 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal