Sciweavers

8763 search results - page 1664 / 1753
» Querying Database Knowledge
Sort
View
RAID
2001
Springer
15 years 6 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
DSN
2000
IEEE
15 years 6 months ago
Whither Generic Recovery from Application Faults? A Fault Study using Open-Source Software
This paper tests the hypothesis that generic recovery techniques, such as process pairs, can survive most application faults without using application-specific information. We ex...
Subhachandra Chandra, Peter M. Chen
SCCC
2000
IEEE
15 years 6 months ago
A Genetic Classifier Tool
Knowledge discovery is the most desirable end product of an enterprise information system. Researches from different areas recognize that a new generation of intelligent tools for...
Aurora T. R. Pozo, Mozart Hasse
ECCV
1998
Springer
15 years 5 months ago
Continuous Audio-Visual Speech Recognition
The Multi-Stream automatic speech recognition approach was investigated in this work as a framework for Audio-Visual data fusion and speech recognition. This method presents many ...
Juergen Luettin, Stéphane Dupont
GI
1998
Springer
15 years 5 months ago
An Efficient Strategy for Tiling Multidimensional OLAP Data Cubes
Computing aggregates over selected categories of multidimensional discrete data (MDD) cubes is the core operation of many on-line analytical processing (OLAP) systems. In order to...
Paolo Marques, Paula Furtado, Peter Baumann
« Prev « First page 1664 / 1753 Last » Next »