Sciweavers

9405 search results - page 297 / 1881
» Computing a Model of Set Theory
Sort
View
WOSP
2005
ACM
15 years 10 months ago
A model transformation framework for the automated building of performance models from UML models
In order to effectively validate the performance of software systems throughout their development cycle it is necessary to continuously build performance models from software mod...
Andrea D'Ambrogio
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CONTEXT
2007
Springer
15 years 8 months ago
The Influence of Task Contexts on the Decision-Making of Humans and Computers
Abstract. Many environments in which people and computer agents interact involve deploying resources to accomplish tasks and satisfy goals. This paper investigates the way that the...
Ya'akov Gal, Barbara J. Grosz, Avi Pfeffer, Stuart...
ICCS
2007
Springer
15 years 11 months ago
Characterizing Implications of Injective Partial Orders
Abstract. Previous work of the authors has studied a notion of implication between sets of sequences based on the conceptual structure of a Galois lattice, and also a way of repres...
José L. Balcázar, Gemma C. Garriga
SIAMCOMP
1998
111views more  SIAMCOMP 1998»
15 years 4 months ago
Computing the Local Consensus of Trees
The inference of consensus from a set of evolutionary trees is a fundamental problem in a number of fields such as biology and historical linguistics, and many models for inferrin...
Sampath Kannan, Tandy Warnow