Sciweavers

178 search results - page 27 / 36
» An Application of Program Derivation Techniques to 18th-Cent...
Sort
View
CCS
2003
ACM
14 years 1 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ICDE
2011
IEEE
237views Database» more  ICDE 2011»
13 years 9 days ago
Creating probabilistic databases from imprecise time-series data
— Although efficient processing of probabilistic databases is a well-established field, a wide range of applications are still unable to benefit from these techniques due to t...
Saket Sathe, Hoyoung Jeung, Karl Aberer
GG
2004
Springer
14 years 2 months ago
Workshop on Graph-Based Tools
Graphs are well-known, well-understood, and frequently used means to depict networks of related items. They are successfully used as the underlying mathematical concept in various ...
Tom Mens, Andy Schürr, Gabriele Taentzer
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 8 months ago
Declarative Combinatorics: Boolean Functions, Circuit Synthesis and BDDs in Haskell
We describe Haskell implementations of interesting combinatorial generation algorithms with focus on boolean functions and logic circuit representations. First, a complete exact c...
Paul Tarau
MSWIM
2005
ACM
14 years 2 months ago
Getting urban pedestrian flow from simple observation: realistic mobility generation in wireless network simulation
In order for precise evaluation of MANET applications, more realistic mobility models are needed in wireless network simulations. In this paper, we focus on the behavior of pedest...
Kumiko Maeda, Kazuki Sato, Kazuki Konishi, Akiko Y...