Sciweavers

3597 search results - page 629 / 720
» Flexible Database Generators
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
138
Voted
EUROPAR
2000
Springer
15 years 8 months ago
On the Performance of Fetch Engines Running DSS Workloads
Abstract This paper examines the behavior of current and next generation microprocessors' fetch engines while running Decision Support Systems (DSS) workloads. We analyze the ...
Carlos Navarro, Alex Ramírez, Josep-Lluis L...
ICCV
1995
IEEE
15 years 8 months ago
Facial Expression Recognition Using a Dynamic Model and Motion Energy
Previous efforts at facial expression recognition have been based on the Facial Action Coding System (FACS), a representation developed in order to allow human psychologists to co...
Irfan A. Essa, Alex Pentland
146
Voted
SIGGRAPH
1997
ACM
15 years 8 months ago
InfiniteReality: a real-time graphics system
The InfiniteRealityTM graphics system is the first general-purpose workstation system specifically designed to deliver 60Hz steady frame rate high-quality rendering of complex sce...
John S. Montrym, Daniel R. Baum, David L. Dignam, ...
138
Voted
WCRE
1997
IEEE
15 years 8 months ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich