Sciweavers

1167 search results - page 173 / 234
» Substitution-closed pattern classes
Sort
View
VL
2008
IEEE
15 years 4 months ago
End-user programming in the wild: A field study of CoScripter scripts
Although a new class of languages has emerged to enable end users to create their own web applications, little is known about how end-user programmers actually use such languages ...
Christopher Bogart, Margaret M. Burnett, Allen Cyp...
FUZZIEEE
2007
IEEE
15 years 4 months ago
Self-Fuzzification Method According to Typicality Correlation for Classification on Tiny Data Sets
— This article presents a self-fuzzification method to enhance the settings of a Fuzzy Reasoning Classification adapted to the automated inspection of wooden boards. The supervis...
Emmanuel Schmitt, Vincent Bombardier, Patrick Char...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
SECON
2007
IEEE
15 years 4 months ago
Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks
—Increasingly many wireless sensor network deployments are using harvested environmental energy to extend system lifetime. Because the temporal profiles of such energy sources e...
Christopher M. Vigorito, Deepak Ganesan, Andrew G....
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode