Sciweavers

675 search results - page 75 / 135
» What Is New in Our City
Sort
View
99
Voted
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 6 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
111
Voted
ISPAN
2000
IEEE
15 years 5 months ago
Versatile Processor Design for Efficiency and High Performance
We present new architectural concepts for uniprocessor designs that conform to the data-driven computation paradigm. Usage of our D2 -CPU (Data-Driven processor) follows the natura...
Sotirios G. Ziavras
SIGCOMM
2000
ACM
15 years 5 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...
AAAI
2010
15 years 2 months ago
Goal-Driven Autonomy in a Navy Strategy Simulation
Modern complex games and simulations pose many challenges for an intelligent agent, including partial observability, continuous time and effects, hostile opponents, and exogenous ...
Matthew Molineaux, Matthew Klenk, David W. Aha
108
Voted
FORTE
2003
15 years 2 months ago
Generation of All Counter-Examples for Push-Down Systems
We present a new, on-the-fly algorithm that given a push-down model representing a sequential program with (recursive) procedure calls and an extended finite-state automaton repr...
Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott ...