Sciweavers

726 search results - page 119 / 146
» From Anomaly Reports to Cases
Sort
View
LCN
1994
IEEE
15 years 3 months ago
The Ethernet Capture Effect: Analysis and Solution
We analyze the behavior of the Ethernet in networks with a small number of active stations, and describe what is known as the Ethernet capture effect, where a station transmits co...
K. K. Ramakrishnan, Henry Yang
USENIX
2008
15 years 2 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
89
Voted
ESEM
2008
ACM
15 years 1 months ago
Some lessons learned in conducting software engineering surveys in china
Component-Based Software Engineering (CBSE) with Open Source Software and Commercial-Off-the-Shelf (COTS) components, Open Source Software (OSS) based development, and Software Ou...
Junzhong Ji, Jingyue Li, Reidar Conradi, Chunnian ...
DAM
2008
136views more  DAM 2008»
14 years 12 months ago
General theory of information transfer: Updated
We report on ideas, problems and results, which occupied us during the past decade and which seem to extend the frontiers of information theory in several directions. The main con...
Rudolf Ahlswede
IJCV
2008
106views more  IJCV 2008»
14 years 11 months ago
Evaluation of Localized Semantics: Data, Methodology, and Experiments
We present a new data set encoding localized semantics for 1014 images and a methodology for using this kind of data for recognition evaluation. This methodology establishes protoc...
Kobus Barnard, Quanfu Fan, Ranjini Swaminathan, An...