Sciweavers

13457 search results - page 2604 / 2692
» Design and Development of the Long-Jumping
Sort
View
CCS
2003
ACM
15 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
COCOS
2003
Springer
148views Optimization» more  COCOS 2003»
15 years 3 months ago
Convex Programming Methods for Global Optimization
We investigate some approaches to solving nonconvex global optimization problems by convex nonlinear programming methods. We assume that the problem becomes convex when selected va...
John N. Hooker
DIGITALCITIES
2003
Springer
15 years 3 months ago
Activities and Technologies in Digital City Kyoto
We have developed a digital city for Kyoto, the old capital and cultural center of Japan, as a social information infrastructure for urban everyday life including shopping, busines...
Toru Ishida
FCT
2003
Springer
15 years 3 months ago
Graph Searching, Elimination Trees, and a Generalization of Bandwidth
The bandwidth minimization problem has a long history and a number of practical applications. In this paper we introduce a natural extension of bandwidth to partially ordered layo...
Fedor V. Fomin, Pinar Heggernes, Jan Arne Telle
HYBRID
2003
Springer
15 years 3 months ago
Mode Reconstruction for Source Coding and Multi-modal Control
s of Invited Presentations The Mathematics of Matter and the Mathematics of Mind . . . . . . . . . . . . . 1 David Berlinski A Grand Challenge: Full Reactive Modeling of a Multi-ce...
Adam Austin, Magnus Egerstedt
« Prev « First page 2604 / 2692 Last » Next »