Sciweavers

10790 search results - page 2071 / 2158
» Using feature models to automate model transformations
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
176
Voted
HASKELL
2009
ACM
15 years 11 months ago
A compositional theory for STM Haskell
We address the problem of reasoning about Haskell programs that use Software Transactional Memory (STM). As a motivating example, we consider Haskell code for a concurrent non-det...
Johannes Borgström, Karthikeyan Bhargavan, An...
127
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
113
Voted
VR
2008
IEEE
188views Virtual Reality» more  VR 2008»
15 years 11 months ago
The Two-User Seating Buck: Enabling Face-to-Face Discussions of Novel Car Interface Concepts
The automotive industry uses physical seating bucks, which are minimal mockups of a car interior, to assess various aspects of the planned interior early in the development proces...
Holger Salzmann, Bernd Froehlich
COMSWARE
2007
IEEE
15 years 11 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
« Prev « First page 2071 / 2158 Last » Next »