Sciweavers

13489 search results - page 2638 / 2698
» Operating System
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 10 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
152
Voted
CCS
2004
ACM
15 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
143
Voted
CSL
2004
Springer
15 years 10 months ago
The Boundary Between Decidability and Undecidability for Transitive-Closure Logics
To reason effectively about programs, it is important to have some version of a transitive-closure operator so that we can describe such notions as the set of nodes reachable from ...
Neil Immerman, Alexander Moshe Rabinovich, Thomas ...
EGH
2004
Springer
15 years 10 months ago
A programmable vertex shader with fixed-point SIMD datapath for low power wireless applications
The real time 3D graphics becomes one of the attractive applications for 3G wireless terminals although their battery lifetime and memory bandwidth limit the system resources for ...
Ju-Ho Sohn, Ramchan Woo, Hoi-Jun Yoo
151
Voted
EKAW
2004
Springer
15 years 10 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
« Prev « First page 2638 / 2698 Last » Next »