Sciweavers

2252 search results - page 306 / 451
» Regular expression patterns
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ICPR
2010
IEEE
15 years 7 months ago
Perceived Age Estimation under Lighting Condition Change by Covariate Shift Adaptation
—Over the recent years, a great deal of effort has been made to age estimation from face images. It has been reported that age can be accurately estimated under controlled enviro...
Kazuya Ueki, Masashi Sugiyama, Yasuyuki Ihara
DSN
2004
IEEE
15 years 6 months ago
Model Checking Action- and State-Labelled Markov Chains
In this paper we introduce the logic asCSL, an extension of continuous stochastic logic (CSL), which provides powerful means to characterise execution paths of action- and state-l...
Christel Baier, Lucia Cloth, Boudewijn R. Haverkor...
ITS
2000
Springer
156views Multimedia» more  ITS 2000»
15 years 6 months ago
A Coached Collaborative Learning Environment for Entity-Relationship Modeling
Abstract. We discuss the design of an agent for coaching collaborative learning in a distance learning context. The learning domain is entity-relationship modeling, a domain in whi...
María de los Angeles Constantino-Gonz&aacut...
INFOCOM
1995
IEEE
15 years 6 months ago
Analysis of One-Way Reservation Algorithms
Modern high speed networks and ATM networks in particular use resource reservation as a basic means of establishing communications. One-way on-the- y reservation is a method for...
Israel Cidon, Raphael Rom, Yuval Shavitt