Sciweavers

2269 search results - page 395 / 454
» Behavioral Intrusion Detection
Sort
View
MIG
2009
Springer
14 years 4 months ago
Exploiting Motion Capture to Enhance Avoidance Behaviour in Games
Abstract. Realistic simulation of interacting virtual characters is essential in computer games, training and simulation applications. The problem is very challenging since people ...
Ben J. H. van Basten, Sander E. M. Jansen, Ioannis...
OOPSLA
2009
Springer
14 years 4 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
FOAL
2009
ACM
14 years 4 months ago
Unweaving the impact of aspect changes in AspectJ
Aspect-oriented programming (AOP) fosters the coding of tangled concerns in separated units that are then woven together in the executable system. Unfortunately, the oblivious nat...
Luca Cavallaro, Mattia Monga
IMC
2009
ACM
14 years 4 months ago
An analysis of packet sampling in the frequency domain
Packet sampling techniques introduce measurement errors that should be carefully handled in order to correctly characterize the network behavior. In the literature several works h...
Luigi Alfredo Grieco, Chadi Barakat
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
14 years 4 months ago
A Bridging Fault Model Where Undetectable Faults Imply Logic Redundancy
We define a robust fault model as a model where the existence of an undetectable fault implies the existence of logic redundancy, or more generally, a suboptimality in the synthe...
Irith Pomeranz, Sudhakar M. Reddy