Sciweavers

109
Voted
INFOCOM
2011
IEEE
14 years 28 days ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
91
Voted
SIGDIAL
2010
14 years 7 months ago
Exploring the Effectiveness of Lexical Ontologies for Modeling Temporal Relations with Markov Logic
Temporal analysis of events is a central problem in computational models of discourse. However, correctly recognizing temporal aspects of events poses serious challenges. This pap...
Eun Y. Ha, Alok Baikadi, Carlyle Licata, Bradford ...
DAC
1995
ACM
15 years 1 months ago
Automatic Clock Abstraction from Sequential Circuits
Our goal is to transform a low-level circuit design into a more representation. A pre-existing tool, Tranalyze [4], takes a switch-level circuit and generates a functionally equiv...
Samir Jain, Randal E. Bryant, Alok Jain
92
Voted
SADFE
2007
IEEE
15 years 3 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...