Sciweavers

1424 search results - page 205 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ICSE
2001
IEEE-ACM
15 years 5 months ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed
BMCBI
2005
98views more  BMCBI 2005»
15 years 1 months ago
Iterative approach to model identification of biological networks
Background: Recent advances in molecular biology techniques provide an opportunity for developing detailed mathematical models of biological processes. An iterative scheme is intr...
Kapil G. Gadkar, Rudiyanto Gunawan, Francis J. Doy...

Publication
179views
15 years 5 months ago
AutoSelect: What You Want Is What You Get Real-Time Processing of Visual Attention and Affect
While objects of our focus of attention (“where we are looking at”) and accompanying affective responses to those objects is part of our daily experience, little research exis...
Nikolaus Bee, Helmut Prendinger, Arturo Nakasone, ...
USENIX
2008
15 years 3 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
KDD
2000
ACM
211views Data Mining» more  KDD 2000»
15 years 5 months ago
Mining IC test data to optimize VLSI testing
We describe an application of data mining and decision analysis to the problem of die-level functional test in integrated circuit manufacturing. Integrated circuits are fabricated...
Tony Fountain, Thomas G. Dietterich, Bill Sudyka