Sciweavers

2236 search results - page 133 / 448
» Intrusion detection techniques and approaches
Sort
View
86
Voted
ISSRE
2006
IEEE
15 years 4 months ago
A Systematic Approach to Generate Inputs to Test UML Design Models
Practical model validation techniques are needed for model driven development (MDD) techniques to succeed. This paper presents an approach to generating inputs to test UML design ...
Trung T. Dinh-Trong, Sudipto Ghosh, Robert B. Fran...
CSB
2003
IEEE
123views Bioinformatics» more  CSB 2003»
15 years 3 months ago
Fourier Harmonic Approach for Visualizing Temporal Patterns of Gene Expression Data
DNA microarray technology provides a broad snapshot of the state of the cell by measuring the expression levels of thousands of genes simultaneously. Visualization techniques can ...
Li Zhang, Aidong Zhang, Murali Ramanathan
87
Voted
DEXA
2005
Springer
118views Database» more  DEXA 2005»
15 years 3 months ago
Detecting Semantically Correct Changes to Relevant Unordered Hidden Web Data
Current proposals for XML change detection use structural constraints to detect the changes and they ignore semantic constraints. Consequently, they may produce semantically incorr...
Vladimir Kovalev, Sourav S. Bhowmick
EVI
2010
156views more  EVI 2010»
14 years 5 months ago
GPU implementation of a road sign detector based on particle swarm optimization
Road Sign Detection is a major goal of the Advanced Driving Assistance Systems. Most published work on this problem share the same approach by which signs are first detected and th...
Luca Mussi, Stefano Cagnoni, Elena Cardarelli, Fab...
81
Voted
CGO
2007
IEEE
15 years 4 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...