Sciweavers

768 search results - page 138 / 154
» Data Movement in Kernelized Systems
Sort
View
IASTEDSEA
2004
15 years 1 months ago
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...
Victor L. Winter, Steve Roach, Fares Fraij
SAC
2002
ACM
14 years 11 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
CORR
2010
Springer
103views Education» more  CORR 2010»
14 years 10 months ago
BioBlender: a Software for Intuitive Representation of Surface Properties of Biomolecules
In this and the associated article BioBlender: A Software for Intuitive Representation of Surface Properties of Biomolecules [1], we present BioBlender as a complete instrument fo...
Raluca Mihaela Andrei, Marco Callieri, Maria Franc...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
15 years 11 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 6 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...