Sciweavers

15792 search results - page 33 / 3159
» Computational Abstraction Steps
Sort
View
124
Voted
AINA
2009
IEEE
15 years 8 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
120
Voted
APLAS
2010
ACM
15 years 3 months ago
Amortized Resource Analysis with Polymorphic Recursion and Partial Big-Step Operational Semantics
This paper studies the problem of statically determining upper bounds on the resource consumption of first-order functional programs. A previous work approached the problem with an...
Jan Hoffmann 0002, Martin Hofmann
130
Voted
WS
2008
ACM
15 years 3 months ago
OWL 2: The next step for OWL
Since achieving W3C recommendation status in 2004, the Web Ontology Language (OWL) has been successfully applied to many problems in computer science. Practical experience with OW...
Bernardo Cuenca Grau, Ian Horrocks, Boris Motik, B...
122
Voted
TIDSE
2004
Springer
15 years 8 months ago
Stepping into the Interactive Drama
Achieving a successful Interactive Drama where the user can act as a character in the story requires not only finding an algorithmic solution for combining interactivity and narrat...
Nicolas Szilas
120
Voted
NDSS
2000
IEEE
15 years 7 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...