Sciweavers

940 search results - page 141 / 188
» A Perspective of Generative Reuse
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
CASSIS
2005
Springer
14 years 2 months ago
Romization: Early Deployment and Customization of Java Systems for Constrained Devices
Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
Alexandre Courbot, Gilles Grimaud, Jean-Jacques Va...
EWCBR
2004
Springer
14 years 2 months ago
Explanations and Case-Based Reasoning: Foundational Issues
By design, Case-Based Reasoning (CBR) systems do not need deep general knowledge. In contrast to (rule-based) expert systems, CBR systems can already be used with just some initial...
Thomas Roth-Berghofer
GIAE
2004
Springer
187views Mathematics» more  GIAE 2004»
14 years 2 months ago
nD Object Representation and Detection from Single 2D Line Drawing
In this paper, we propose the wireframe representation of nD object, which is a single 2D line drawing. A wireframe model of an nD object is composed of a set of edges connecting a...
Hongbo Li, Quan Wang, Lina Zhao, Ying Chen, Lei Hu...
VLDB
2004
ACM
126views Database» more  VLDB 2004»
14 years 2 months ago
ROX: Relational Over XML
An increasing percentage of the data needed by business applications is being generated in XML format. Storing the XML in its native format will facilitate new applications that e...
Alan Halverson, Vanja Josifovski, Guy M. Lohman, H...