Sciweavers

4445 search results - page 760 / 889
» Reflective Authorization Systems
Sort
View
TIM
2010
144views Education» more  TIM 2010»
14 years 4 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ICASSP
2011
IEEE
14 years 1 months ago
A simplified Subspace Gaussian Mixture to compact acoustic models for speech recognition
Speech recognition applications are known to require a significant amount of resources (memory, computing power). However, embedded speech recognition systems, such as in mobile p...
Mohamed Bouallegue, Driss Matrouf, Georges Linares
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
113
Voted
CHI
2011
ACM
14 years 1 months ago
The concept maps method as a tool to evaluate the usability of APIs
Application programming interfaces (APIs) are the interfaces to existing code structures, such as widgets, frameworks, or toolkits. Therefore, they very much do have an impact on ...
Jens Gerken, Hans-Christian Jetter, Michael Zö...