Sciweavers

1804 search results - page 196 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
FAST
2010
15 years 7 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
187
Voted
MM
1998
ACM
150views Multimedia» more  MM 1998»
15 years 8 months ago
Zodiac: A History-Based Interactive Video Authoring System
Easy-to-use audio/video authoring tools play a crucial role in moving multimedia software from research curiosity to mainstream applications. However, research in multimedia author...
Tzi-cker Chiueh, Tulika Mitra, Anindya Neogi, Chua...
145
Voted
FLOPS
1999
Springer
15 years 8 months ago
Using Types as Approximations for Type Checking Prolog Programs
Abstract. Subtyping tends to undermine the effects of parametric polymorphism as far as the static detection of type errors is concerned. Starting with this observation we present...
Christoph Beierle, Gregor Meyer
CVPR
2004
IEEE
16 years 6 months ago
Visual Odometry and Map Correlation
In this paper, we study how estimates of ego-motion based on feature tracking (visual odometry) can be improved using a rough (low accuracy) map of where the observer has been. We...
Anat Levin, Richard Szeliski
145
Voted
JSS
2008
122views more  JSS 2008»
15 years 3 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche