Sciweavers

2269 search results - page 407 / 454
» Behavioral Intrusion Detection
Sort
View
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
14 years 2 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
VISUALIZATION
2002
IEEE
14 years 2 months ago
Exploring Scalar Fields Using Critical Isovalues
Isosurfaces are commonly used to visualize scalar fields. Critical isovalues indicate isosurface topology changes: the creation of new surface components, merging of surface comp...
Gunther H. Weber, Gerik Scheuermann, Hans Hagen, B...
WSE
2002
IEEE
14 years 2 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
GECCO
2009
Springer
153views Optimization» more  GECCO 2009»
14 years 2 months ago
An evaporation mechanism for dynamic and noisy multimodal optimization
Dealing with imprecise information is a common characteristic in real-world problems. Specifically, when the source of the information are physical sensors, a level of noise in t...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
ICSE
2001
IEEE-ACM
14 years 2 months ago
A Scalable Formal Method for Design and Automatic Checking of User Interfaces
The paper addresses the formal specification, design and implementation of the behavioral component of graphical user interfaces. The complex sequences of visual events and action...
Jean Berstel, Stefano Crespi-Reghizzi, Gilles Rous...