Sciweavers

415 search results - page 7 / 83
» Intruders pattern identification
Sort
View
FPL
2007
Springer
99views Hardware» more  FPL 2007»
15 years 1 months ago
Disjoint Pattern Enumeration for Custom Instructions Identification
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. These custom instructions are selected through an analys...
Pan Yu, Tulika Mitra
CIKM
2008
Springer
14 years 11 months ago
Identification of class specific discourse patterns
In this paper we address the problem of extracting important (and unimportant) discourse patterns from call center conversations. Call centers provide dialog based calling-in supp...
Anup Chalamalla, Sumit Negi, L. Venkata Subramania...
DEBS
2007
ACM
14 years 11 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
IWPSE
2007
IEEE
15 years 4 months ago
Visual identification of software evolution patterns
Software evolution plays a key role in the overall lifecycle of a software system. In this phase, software developers extend the capabilities and functionality of the system to me...
Andrejs Jermakovics, Marco Scotto, Giancarlo Succi
TSE
2008
101views more  TSE 2008»
14 years 9 months ago
DeMIMA: A Multilayered Approach for Design Pattern Identification
Design patterns are important in object-oriented programming because they offer design motifs, elegant solutions to recurrent design problems, which improve the quality of software...
Yann-Gaël Guéhéneuc, Giuliano A...