Sciweavers

9006 search results - page 1765 / 1802
» Modeling Software
Sort
View
IWIA
2005
IEEE
15 years 5 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
RSP
2005
IEEE
164views Control Systems» more  RSP 2005»
15 years 5 months ago
High Level Synthesis for Data-Driven Applications
Abstract— John von Neumann proposed his famous architecture in a context where hardware was very expensive and bulky. His goal was to maximize functionality with minimal hardware...
Etienne Bergeron, Xavier Saint-Mleux, Marc Feeley,...
PPOPP
2005
ACM
15 years 5 months ago
Teleport messaging for distributed stream programs
In this paper, we develop a new language construct to address one of the pitfalls of parallel programming: precise handling of events across parallel components. The construct, te...
William Thies, Michal Karczmarek, Janis Sermulins,...
SACMAT
2005
ACM
15 years 5 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGIR
2005
ACM
15 years 5 months ago
The maximum entropy method for analyzing retrieval measures
We present a model, based on the maximum entropy method, for analyzing various measures of retrieval performance such as average precision, R-precision, and precision-at-cutoffs....
Javed A. Aslam, Emine Yilmaz, Virgiliu Pavlu
« Prev « First page 1765 / 1802 Last » Next »