Sciweavers

430 search results - page 59 / 86
» Statistical Certification of Software Systems
Sort
View
87
Voted
RAID
2001
Springer
15 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
76
Voted
DL
1999
Springer
121views Digital Library» more  DL 1999»
15 years 1 months ago
Does Zooming Improve Image Browsing?
We describe an image retrieval system we built based on a Zoomable User Interface (ZUI). We also discuss the design, results and analysis of a controlled experiment we performed o...
Tammara T. A. Combs, Benjamin B. Bederson
99
Voted
WSC
1997
14 years 11 months ago
AutoMod Tutorial
The AutoModTM simulation system differs significantly from other systems because of its ability to deal with the physical elements of a system in physical (graphical) terms and th...
Matthew W. Rohrer
MVA
1992
14 years 10 months ago
High Speed Autofocus for Microscopic Images
2 Computational Theory The processing of biological specimens or the 2.1 Overview examination of material surfaces for quality control requires a fast and precise autofocus system....
J. E. Fischer, D. Homeister, J. Lehmler, G. Roos
SIGSOFT
2007
ACM
15 years 10 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska