Sciweavers

5962 search results - page 304 / 1193
» Working with Patterns and Code
Sort
View
DSN
2006
IEEE
15 years 11 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
CSB
2003
IEEE
113views Bioinformatics» more  CSB 2003»
15 years 10 months ago
An Optimal DNA Segmentation Based on the MDL Principle
: The biological world is highly stochastic and inhomogeneous in its behaviour. There are regions in DNA with high concentration of G or C bases; stretches of sequences with an abu...
Wojciech Szpankowski, Wenhui Ren, Lukasz Szpankows...
187
Voted
IPPS
1997
IEEE
15 years 9 months ago
DPF: A Data Parallel Fortran Benchmark Suite
We present the Data Parallel Fortran (DPF) benchmark suite, a set of data parallel Fortran codes forevaluatingdata parallel compilers appropriatefor any target parallel architectu...
Y. Charlie Hu, S. Lennart Johnsson, Dimitris Kehag...
ESA
2008
Springer
92views Algorithms» more  ESA 2008»
15 years 6 months ago
How Reliable Are Practical Point-in-Polygon Strategies?
We experimentally study the reliability of geometric software for point location in simple polygons. As expected, the code we tested works very well for random query points. Howeve...
Stefan Schirra
ICML
2009
IEEE
16 years 5 months ago
Ranking interesting subgroups
Subgroup discovery is the task of identifying the top k patterns in a database with most significant deviation in the distribution of a target attribute Y . Subgroup discovery is ...
Stefan Rueping