Sciweavers

1756 search results - page 138 / 352
» Current Directions in Hyper-Programming
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
KES
1998
Springer
15 years 8 months ago
Passive ranging using image expansion
This paper describes a new technique for passive ranging which is of special interest in areas such as covert nap-of-the-earth helicopter flight and spacecraft landing. This techn...
Yair Barniv
ICCAD
1997
IEEE
127views Hardware» more  ICCAD 1997»
15 years 8 months ago
OPTIMIST: state minimization for optimal 2-level logic implementation
We present a novel method for state minimization of incompletely-specified finite state machines. Where classic methods simply minimize the number of states, ours directly addre...
Robert M. Fuhrer, Steven M. Nowick
ICSE
1997
IEEE-ACM
15 years 8 months ago
Argo: A Design Environment for Evolving Software Architectures
Software architectures evolve as the result of numerous, interrelated design decisions. At any point in an architecture’s evolution, current decisions can critically affect alte...
Jason E. Robbins, David M. Hilbert, David F. Redmi...
SIGGRAPH
1990
ACM
15 years 7 months ago
Cone-spheres
This paper proposes to use relief-mapped conical frusta (cones cut by planes) to skin skeletal objects. Based on this representation, current programmable graphics hardware can pe...
Nelson L. Max