Sciweavers

2269 search results - page 409 / 454
» Behavioral Intrusion Detection
Sort
View
VL
1996
IEEE
162views Visual Languages» more  VL 1996»
14 years 2 months ago
Interactive Authoring of Multimedia Documents
As multimedia applications spread widely, it is crucial for programming and design support systems to handle "time" in multimedia documents effectively and flexibly. This...
Junehwa Song, Michelle Y. Kim, G. Ramalingam, Raym...
ICPP
1993
IEEE
14 years 2 months ago
A Unified Model for Concurrent Debugging
: Events are occurrence instances of actions. The thesis of this paper is that the use of “actions”, instead of events, greatly simplifies the problem of concurrent debugging....
S. I. Hyder, John Werth, James C. Browne
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
14 years 1 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
EATIS
2007
ACM
14 years 1 months ago
Ontology Based Affective Context Representation
In this paper we propose an ontology based representation of the affective states for context aware applications that allows expressing the complex relations that are among the af...
Kuderna-Iulian Benta, Anca Rarau, Marcel Cremene
ATS
2004
IEEE
116views Hardware» more  ATS 2004»
14 years 1 months ago
Testing for Missing-Gate Faults in Reversible Circuits
Logical reversibility occurs in low-power applications and is an essential feature of quantum circuits. Of special interest are reversible circuits constructed from a class of rev...
John P. Hayes, Ilia Polian, Bernd Becker