Sciweavers

895 search results - page 150 / 179
» A User Guide to HyTech
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 12 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
HOTOS
1997
IEEE
13 years 12 months ago
Run-Time Code Generation as a Central System Service
We are building an operating system in which an integral run-time code generator constantly strives to improve the quality of already executing code. Our system is based on a plat...
Michael Franz
PADS
1996
ACM
13 years 12 months ago
Experiments in Automated Load Balancing
One of the promises of parallelized discrete-event simulation is that it might provide significant speedups over sequential simulation. In reality, high performance cannot be achi...
Linda F. Wilson, David M. Nicol
KBSE
1994
IEEE
13 years 12 months ago
A Formal Approach to Domain-Oriented Software Design Environments
This paper describes a formal approach to domain-oriented software design environments, based on declarative domain theories, formal specifications, and deductive program synthesi...
Michael R. Lowry, Andrew Philpot, Thomas Pressburg...
HT
1993
ACM
13 years 11 months ago
Searching for the Missing Link: Discovering Implicit Structure in Spatial Hypertext
Hypertexts may be implicitly structured, based on either node content or context. In this paper, we examine implicit structures that rely on the interpretation of node’s spatial...
Catherine C. Marshall, Frank M. Shipman III