Sciweavers

1734 search results - page 234 / 347
» What works
Sort
View
107
Voted
EJC
2008
15 years 27 days ago
Eriksson's numbers game and finite Coxeter groups
The numbers game is a one-player game played on a finite simple graph with certain "amplitudes" assigned to its edges and with an initial assignment of real numbers to i...
Robert G. Donnelly
IANDC
2008
128views more  IANDC 2008»
15 years 27 days ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
DEBU
2006
163views more  DEBU 2006»
15 years 26 days ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...
103
Voted
ENTCS
2006
136views more  ENTCS 2006»
15 years 25 days ago
Adaptive Application of SAT Solving Techniques
New heuristics and strategies have enabled major advancements in SAT solving in recent years. However, experimentation has shown that there is no winning solution that works in al...
Ohad Shacham, Karen Yorav
IJSN
2008
80views more  IJSN 2008»
15 years 25 days ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah