Sciweavers

5639 search results - page 395 / 1128
» Timed Abstract Non-interference
Sort
View
ETRICS
2006
15 years 8 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CIE
2005
Springer
15 years 6 months ago
Shrad: A Language for Sequential Real Number Computation
Since Di Gianantonio [1993] introduced his semantics for exact real omputation, there has always been a struggle to maintain data abstraction and efficiency as much as possible. T...
Amin Farjudian
ACL
2008
15 years 5 months ago
Solving Relational Similarity Problems Using the Web as a Corpus
We present a simple linguistically-motivated method for characterizing the semantic relations that hold between two nouns. The approach leverages the vast size of the Web in order...
Preslav Nakov, Marti A. Hearst
CASCON
1997
85views Education» more  CASCON 1997»
15 years 5 months ago
Fast detection of communication patterns in distributed executions
Understanding distributed applications is a tedious and di cult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the executio...
Thomas Kunz, Michiel F. H. Seuren
MM
2010
ACM
146views Multimedia» more  MM 2010»
15 years 4 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...