Sciweavers

578 search results - page 95 / 116
» Analysis of Programs with Exception-Handling Constructs
Sort
View
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
COLT
2005
Springer
14 years 1 months ago
Martingale Boosting
In recent work Long and Servedio [LS05] presented a “martingale boosting” algorithm that works by constructing a branching program over weak classifiers and has a simple anal...
Philip M. Long, Rocco A. Servedio
ICALP
2004
Springer
14 years 28 days ago
A Domain Theoretic Account of Picard's Theorem
We present a domain-theoretic version of Picard’s theorem for solving classical initial value problems in Rn . For the case of vector fields that satisfy a Lipschitz condition, ...
Abbas Edalat, Dirk Pattinson
HT
2000
ACM
13 years 12 months ago
Making a successful case for a hypertextual doctoral dissertation
In August of 1998 I completed the first hypertextual dissertation at Rensselaer Polytechnic Institute. The dissertation was a case study applying methods of rhetorical analysis an...
Christine Boese
BIRTHDAY
2003
Springer
13 years 11 months ago
Aspect Validation Using Model Checking
Aspects are intended to add needed functionality to a system or to treat concerns of the system by augmenting or changing the existing code in a manner that cross-cuts the usual c...
Shmuel Katz, Marcelo Sihman