Sciweavers

3771 search results - page 518 / 755
» Subobject Transformation Systems
Sort
View
SPIN
2009
Springer
15 years 10 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ACMSE
2009
ACM
15 years 10 months ago
A case for compiler-driven superpage allocation
Most modern microprocessor-based systems provide support for superpages both at the hardware and software level. Judicious use of superpages can significantly cut down the number...
Joshua Magee, Apan Qasem
CISS
2008
IEEE
15 years 10 months ago
Frames in bioimaging
We survey our work on adaptive multiresolution (MR) approaches to the classification of biological images. The system adds MR decomposition in front of a generic classifier cons...
Amina Chebira, Jelena Kovacevic
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 10 months ago
Conceiving Interoperability between Public Authorities - A Methodical Framework
An increasing level of cooperation between public administrations nowadays on national, regional and local level requires methods to develop interoperable EGovernment systems and ...
Jörg Ziemann, Thomas Matheis, Dirk Werth
IDEAS
2008
IEEE
153views Database» more  IDEAS 2008»
15 years 10 months ago
Pattern based processing of XPath queries
As the popularity of areas including document storage and distributed systems continues to grow, the demand for high performance XML databases is increasingly evident. This has le...
Gerard Marks, Mark Roantree