Sciweavers

2413 search results - page 326 / 483
» Understanding the problem
Sort
View
CCS
2003
ACM
15 years 8 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
120
Voted
ECCV
2010
Springer
15 years 8 months ago
Stacked Hierarchical Labeling
In this work we propose a hierarchical approach for labeling semantic objects and regions in scenes. Our approach is reminiscent of early vision literature in that we use a decompo...
129
Voted
ICPP
2002
IEEE
15 years 8 months ago
Optimal Code Size Reduction for Software-Pipelined Loops on DSP Applications
Code size expansion of software-pipelined loops is a critical problem for DSP systems with strict code size constraint. Some ad-hoc code size reduction techniques were used to try...
Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha
142
Voted
ICSM
2002
IEEE
15 years 8 months ago
From Legacy to Web through Interaction Modeling
In the context of the CelLEST project, we have been investigating the problem of reengineering and reusing the services provided by legacy applications, running on mainframe hosts...
Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenso...
172
Voted
ICSM
2002
IEEE
15 years 8 months ago
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram
When a software system enters the maintenance phase, the availability of accurate and consistent information about its organization can help alleviate the difficulties of program...
Paolo Tonella, Alessandra Potrich