Sciweavers

10406 search results - page 1769 / 2082
» Using RDF to Model the Structure and Process of Systems
Sort
View
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 10 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
JCST
2008
121views more  JCST 2008»
15 years 5 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
ISPASS
2010
IEEE
16 years 48 min ago
Dynamic program analysis of Microsoft Windows applications
—Software instrumentation is a powerful and flexible technique for analyzing the dynamic behavior of programs. By inserting extra code in an application, it is possible to study...
Alex Skaletsky, Tevi Devor, Nadav Chachmon, Robert...
MOBILITY
2009
ACM
15 years 11 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio
SAINT
2003
IEEE
15 years 10 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
« Prev « First page 1769 / 2082 Last » Next »