Sciweavers

9507 search results - page 1702 / 1902
» Time-based language models
Sort
View
CCS
2003
ACM
15 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CONTEXT
2003
Springer
15 years 10 months ago
Unpacking Meaning from Words: A Context-Centered Approach to Computational Lexicon Design
Abstract. The knowledge representation tradition in computational lexicon design represents words as static encapsulations of purely lexical knowledge. We suggest that this view po...
Hugo Liu
165
Voted
FATES
2003
Springer
15 years 10 months ago
JMLAutoTest: A Novel Automated Testing Framework Based on JML and JUnit
Abstract. Writing specifications using Java Modeling Language has been accepted for a long time as a practical approach to increasing the correctness and quality of Java programs. ...
Guoqing Xu, Zongyuang Yang
ICALP
2010
Springer
15 years 9 months ago
Tight Thresholds for Cuckoo Hashing via XORSAT
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a s...
Martin Dietzfelbinger, Andreas Goerdt, Michael Mit...
IWOMP
2010
Springer
15 years 9 months ago
A ROSE-Based OpenMP 3.0 Research Compiler Supporting Multiple Runtime Libraries
OpenMP is a popular and evolving programming model for shared-memory platforms. It relies on compilers to target modern hardware architectures for optimal performance. A variety of...
Chunhua Liao, Daniel J. Quinlan, Thomas Panas, Bro...
« Prev « First page 1702 / 1902 Last » Next »