Sciweavers

1268 search results - page 151 / 254
» One Logic to Use Them All
Sort
View
108
Voted
ISORC
2002
IEEE
15 years 5 months ago
Packaging Quality of Service Control Behaviors for Reuse
Two limitations of the current implementations of adaptive QoS behaviors are complexity associated with inserting them into common application contexts and lack of reusability acr...
Richard E. Schantz, Joseph P. Loyall, Michael Atig...
117
Voted
AAAI
1997
15 years 2 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand
120
Voted
IPPS
2007
IEEE
15 years 7 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
107
Voted
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 6 months ago
E - A Generic Event Model for Event-Centric Multimedia Data Management in eChronicle Applications
eChronicle applications are inherently event-centric, enabling users to find and explore important events in an application domain and providing unified access to any media that...
Utz Westermann, Ramesh Jain
95
Voted
CASES
2003
ACM
15 years 6 months ago
Reducing code size with echo instructions
In an embedded system, the cost of storing a program onchip can be as high as the cost of a microprocessor. Compressing an application’s code to reduce the amount of memory requ...
Jeremy Lau, Stefan Schoenmackers, Timothy Sherwood...