Sciweavers

3708 search results - page 344 / 371
» Programming with C Exceptions
Sort
View
91 views 90 votes 15 years 5 months ago  STOC 1997»
We examine a class of collective coin- ipping games that arises from randomized distributed algorithms with halting failures. In these games, a sequence of local coin ips is gener...
163 views 121 votes 15 years 4 months ago  FPGA 2004»
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
173 views 98 votes 15 years 2 months ago  CCS 2008»
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
101 views 96 votes 15 years 2 months ago  IMC 2007»
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with policies ab...
127 views 127 votes 15 years 2 months ago  NIPS 2004»
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
156 views 116 votes 15 years 27 days ago  CAD 2008»
This paper proposes a new concept of polycube splines and develops novel modeling techniques for using the polycube splines in solid modeling and shape computing. Polycube splines...
126 views 129 votes 15 years 27 days ago  CONSTRAINTS 2010»
Abstract. We describe a simple CSP formalism for handling multi-attribute preference problems with hard constraints, one that combines hard constraints and preferences so the two a...
186 views 108 votes 15 years 26 days ago  CORR 2010»
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
119 views 112 votes 15 years 25 days ago  BMCBI 2006»
Background: Recently, a large number of methods for the analysis of microarray data have been proposed but there are few comparisons of their relative performances. By using so-ca...
149 views 107 votes 15 years 22 days ago  JUCS 2008»
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...