Sciweavers

8770 search results - page 1615 / 1754
» Named Service Networking
Sort
View
CCS
2007
ACM
15 years 5 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ER
2007
Springer
190views Database» more  ER 2007»
15 years 5 months ago
The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing
The tutorial first addresses requirements and semantic problems to integrate digital information into large scale, meaningful networks of knowledge that support not only access to...
Martin Doerr, Christian-Emil Ore, Stephen Stead
CODES
2006
IEEE
15 years 5 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
IJCNN
2006
IEEE
15 years 5 months ago
Non-Relevance Feedback Document Retrieval based on One Class SVM and SVDD
— This paper reports a new document retrieval method using non-relevant documents. Especially, this paper reports a comparison of retrieval efficiency between One Class Support ...
Takashi Onoda, Hiroshi Murata, Seiji Yamada
IJCNN
2006
IEEE
15 years 5 months ago
Tentacled Self-Organizing Map for Effective Data Extraction
— Since we can accumulate a huge amount of data including useless information in these years, it is important to investigate various extraction method of clusters from data inclu...
Haruna Matsushita, Yoshifumi Nishio
« Prev « First page 1615 / 1754 Last » Next »