Sciweavers

88 search results - page 4 / 18
» Creating knowledge maps by exploiting dependent relationship...
Sort
View
ACSAC
2004
IEEE
14 years 9 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICMCS
2007
IEEE
161views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Generating High-Resolution Textures for 3D Virtual Environments using View-Independent Texture Mapping
Image based modeling and rendering techniques have become increasingly popular for creating and visualizing 3D models from a set of images. Typically, these techniques depend on v...
Charalambos Poullis, Suya You, Ulrich Neumann
FUIN
2000
109views more  FUIN 2000»
13 years 8 months ago
Building Knowledge Scouts Using KGL Metalanguage
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...
Ryszard S. Michalski, Kenneth A. Kaufman
DATE
2008
IEEE
118views Hardware» more  DATE 2008»
13 years 10 months ago
Layout Level Timing Optimization by Leveraging Active Area Dependent Mobility of Strained-Silicon Devices
Advanced MOSFETs such as Strained Silicon (SS) devices have emerged as critical enablers to keep Moore's law on track for sub100nm technologies. Use of Strained Silicon devic...
Ashutosh Chakraborty, Sean X. Shi, David Z. Pan
PDPTA
2010
13 years 6 months ago
A Novel Computation-to-core Mapping Scheme for Robust Facet Image Modeling on GPUs
Though the GPGPU concept is well-known in image processing, much more work remains to be done to fully exploit GPUs as an alternative computation engine. The difficulty is not refo...
Seung In Park, Yong Cao, Layne T. Watson