Sciweavers

8177 search results - page 462 / 1636
» Detecting System Emulators
Sort
View
FIW
2009
163views Communications» more  FIW 2009»
15 years 2 months ago
Detecting policy conflicts by model checking UML state machines
Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay...
Maurice H. ter Beek, Stefania Gnesi, Carlo Montang...
148
Voted
ACL
2012
13 years 7 months ago
Fast Online Training with Frequency-Adaptive Learning Rates for Chinese Word Segmentation and New Word Detection
We present a joint model for Chinese word segmentation and new word detection. We present high dimensional new features, including word-based features and enriched edge (label-tra...
Xu Sun, Houfeng Wang, Wenjie Li
136
Voted
SOSP
2007
ACM
16 years 1 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
BSN
2009
IEEE
145views Sensor Networks» more  BSN 2009»
15 years 11 months ago
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...
SIGCOMM
2009
ACM
15 years 11 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...