Sciweavers

458 search results - page 78 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
TVLSI
2010
13 years 4 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
USENIX
2003
13 years 11 months ago
Learning Spam: Simple Techniques For Freely-Available Software
The problem of automatically filtering out spam e-mail using a classifier based on machine learning methods is of great recent interest. This paper gives an introduction to mach...
Bart Massey, Mick Thomure, Raya Budrevich, Scott L...
ICIP
2000
IEEE
14 years 11 months ago
Discovering Recurrent Visual Semantics in Consumer Photographs
We present techniques to semi-automatically discover Recurrent Visual Semantics (RVS) -the repetitive appearance of visually similar elements such as objects and scenes- in consum...
Alejandro Jaimes, Ana B. Benitez, Shih-Fu Chang, A...
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
14 years 3 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
WSDM
2010
ACM
210views Data Mining» more  WSDM 2010»
14 years 7 months ago
Towards Recency Ranking in Web Search
In web search, recency ranking refers to ranking documents by relevance which takes freshness into account. In this paper, we propose a retrieval system which automatically detect...
Anlei Dong, Yi Chang, Zhaohui Zheng, Gilad Mishne,...