Sciweavers

458 search results - page 80 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
WWW
2006
ACM
14 years 10 months ago
Retroactive answering of search queries
Major search engines currently use the history of a user's actions (e.g., queries, clicks) to personalize search results. In this paper, we present a new personalized service...
Beverly Yang, Glen Jeh
TACAS
2009
Springer
132views Algorithms» more  TACAS 2009»
14 years 4 months ago
Transition-Based Directed Model Checking
Abstract. Directed model checking is a well-established technique that is tailored to fast detection of system states that violate a given safety property. This is achieved by inï¬...
Martin Wehrle, Sebastian Kupferschmid, Andreas Pod...
OSDI
2004
ACM
14 years 10 months ago
Using Magpie for Request Extraction and Workload Modelling
Tools to understand complex system behaviour are essential for many performance analysis and debugging tasks, yet there are many open research problems in their development. Magpi...
Paul Barham, Austin Donnelly, Rebecca Isaacs, Rich...
TCAD
2008
183views more  TCAD 2008»
13 years 9 months ago
Systematic and Automated Multiprocessor System Design, Programming, and Implementation
Abstract--For modern embedded systems in the realm of highthroughput multimedia, imaging, and signal processing, the complexity of embedded applications has reached a point where t...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
PERVASIVE
2010
Springer
14 years 4 months ago
On the Use of Brain Decoded Signals for Online User Adaptive Gesture Recognition Systems
Activity and context recognition in pervasive and wearable computing ought to continuously adapt to changes typical of open-ended scenarios, such as changing users, sensor characte...
Kilian Förster, Andrea Biasiucci, Ricardo Cha...