Sciweavers

3865 search results - page 720 / 773
» From Bidirectionality to Alternation
Sort
View
NDSS
2000
IEEE
15 years 3 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
TYPES
2000
Springer
15 years 3 months ago
A Tour with Constructive Real Numbers
Abstract. The aim of this work is to characterize constructive real numbers through a minimal axiomatization. We introduce, discuss and justify 16 constructive axioms. Then we addr...
Alberto Ciaffaglione, Pietro Di Gianantonio
EWSPT
1995
Springer
15 years 3 months ago
Process Modelling Languages: One or Many?
The paper describes the different phases and subdomains of process modelling and their needs for conceptual and linguistic support, and in what forms. We group the relevant factor...
Reidar Conradi, Chunnian Liu
ISSAC
1995
Springer
155views Mathematics» more  ISSAC 1995»
15 years 3 months ago
On the Implementation of Dynamic Evaluation
Dynamic evaluation is a technique for producing multiple results according to a decision tree which evolves with program execution. Sometimes it is desired to produce results for ...
Peter A. Broadbery, T. Gómez-Díaz, S...
ITC
1995
IEEE
102views Hardware» more  ITC 1995»
15 years 3 months ago
Visualizing Quality
Real-world data is known to be imperfect, suffering from various forms of defects such as sensor variability, estimation errors, uncertainty, human errors in data entry, and gaps ...
Solomon Max