Sciweavers

2450 search results - page 390 / 490
» Exploring Unknown Environments
Sort
View
93
Voted
RAID
2009
Springer
15 years 10 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
128
Voted
CANDC
2009
ACM
15 years 10 months ago
Discovery is never by chance: designing for (un)serendipity
Serendipity has a long tradition in the history of science as having played a key role in many significant discoveries. Computer scientists, valuing the role of serendipity in dis...
Paul André, m. c. schraefel, Jaime Teevan, ...
153
Voted
CSE
2008
IEEE
15 years 10 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan
114
Voted
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
15 years 10 months ago
Compositional design of isochronous systems
The synchronous modeling paradigm provides strong execution correctness guarantees to embedded system design while making minimal environmental assumptions. In most related framew...
Jean-Pierre Talpin, Julien Ouy, Loïc Besnard,...
159
Voted
DIGITEL
2008
IEEE
15 years 10 months ago
Development of Educational Videogames in m-Learning Contexts
The educational gaming field is rapidly growing both in acceptance and variety. Within this variety, the technological evolution of wireless/handheld (W/H) computing devices is op...
Pablo Lavín-Mera, Pablo Moreno-Ger, Baltasa...