Sciweavers

1029 search results - page 138 / 206
» Dependence Anti Patterns
Sort
View
155
Voted
SPIN
2009
Springer
15 years 11 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
SOUPS
2009
ACM
15 years 11 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 11 months ago
Coverage control for nonholonomic agents
— Consider a coverage problem for a team of agents in the plane: target points appear sporadically over time in a bounded environment and must be visited by one of the agents. It...
John Enright, Ketan Savla, Emilio Frazzoli
CVPR
2008
IEEE
15 years 11 months ago
A robust descriptor based on Weber's Law
Inspired by Weber's Law, this paper proposes a simple, yet very powerful and robust local descriptor, Weber Local Descriptor (WLD). It is based on the fact that human percept...
Jie Chen, Shiguang Shan, Guoying Zhao, Xilin Chen,...
152
Voted
DASFAA
2008
IEEE
168views Database» more  DASFAA 2008»
15 years 11 months ago
SemanticTwig: A Semantic Approach to Optimize XML Query Processing
Twig pattern matching (TPM) is the core operation of XML query processing. Existing approaches rely on either efficient data structures or novel labeling/indexing schemes to reduce...
Zhifeng Bao, Tok Wang Ling, Jiaheng Lu, Bo Chen