Sciweavers

903 search results - page 94 / 181
» Usability inspection methods
Sort
View
CIA
2008
Springer
15 years 14 days ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
FMCO
2008
Springer
133views Formal Methods» more  FMCO 2008»
15 years 1 days ago
BML and Related Tools
The Bytecode Modeling Language (BML) is a specication for Java bytecode, that provides a high level of abstraction, while not restricting the format of the bytecode. Notably, BML s...
Jacek Chrzaszcz, Marieke Huisman, Aleksy Schubert
GIL
2004
14 years 12 months ago
Verzichten die Landwirte zu (Un)Recht auf den Einsatz von Optimierungsverfahren?
Abstract: In this paper we examine the usefulness of optimisation methods for practical farm program decisions. We inspect three Brandenburg cash crop farms over the last five year...
Oliver Mußhoff, Norbert Hirschauer
CGF
2000
110views more  CGF 2000»
14 years 10 months ago
Directional Discretized Occluders for Accelerated Occlusion Culling
We present a technique for accelerating the rendering of high depth-complexity scenes. In a preprocessing stage, we approximate the input model with a hierarchical data structure ...
Fausto Bernardini, James T. Klosowski, Jihad El-Sa...
CHI
2011
ACM
14 years 2 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...