Sciweavers

7504 search results - page 1373 / 1501
» Computing with Action Potentials
Sort
View
137
Voted
RAID
1999
Springer
15 years 7 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
109
Voted
RAID
1999
Springer
15 years 7 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
115
Voted
ICS
1998
Tsinghua U.
15 years 7 months ago
Load Execution Latency Reduction
In order to achieve high performance, contemporary microprocessors must effectively process the four major instruction types: ALU, branch, load, and store instructions. This paper...
Bryan Black, Brian Mueller, Stephanie Postal, Ryan...
166
Voted
CHI
1997
ACM
15 years 7 months ago
MOBI-D: A Model-Based Development Environment for User-Centered Design
MOBI-D (Model-Based Interface Designer) is a software environment the design and development of user interfaces from declarative interface models. End-users informally describe ta...
Angel R. Puerta, David Maulsby
CVRMED
1997
Springer
15 years 7 months ago
Development and validation of a navigational guidance system for acetabular implant placement
During the past year our group has been developing HipNav, a system which helps surgeons determine optimal, patient-specific acetabular implant placement and accurately achieve the...
David A. Simon, Branislav Jaramaz, Mike Blackwell,...
« Prev « First page 1373 / 1501 Last » Next »