Sciweavers

3516 search results - page 500 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ACSAC
2003
IEEE
15 years 8 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
INTERNET
2002
175views more  INTERNET 2002»
15 years 4 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
DAC
2009
ACM
15 years 11 months ago
ARMS - automatic residue-minimization based sampling for multi-point modeling techniques
This paper describes an automatic methodology for optimizing sample point selection for using in the framework of model order reduction (MOR). The procedure, based on the maximiza...
Jorge Fernandez Villena, Luis Miguel Silveira
JMM2
2006
126views more  JMM2 2006»
15 years 4 months ago
Modeling Augmented Reality User Interfaces with SSIML/AR
Augmented Reality (AR) technologies open up new possibilities especially for task-focused domains such as assembly and maintenance. However, it can be noticed that there is still a...
Arnd Vitzthum, Heinrich Hussmann
ICASSP
2011
IEEE
14 years 8 months ago
Discriminative duration modeling for speech recognition with segmental conditional random fields
This paper describes a new approach to modeling duration for LVCSR using SCARF, a toolkit for speech recognition with segmental conditional random fields. We utilize SCARF’s abi...
Justine T. Kao, Geoffrey Zweig, Patrick Nguyen