Sciweavers

1513 search results - page 258 / 303
» Cryptographic Pattern Matching
Sort
View
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 7 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
ENTCS
2008
78views more  ENTCS 2008»
13 years 7 months ago
Silver: an Extensible Attribute Grammar System
Attribute grammar specification languages, like many domain specific languages, offer significant advantages to their users, such as high-level declarative constructs and domain-s...
Eric Van Wyk, Derek Bodin, Jimin Gao, Lijesh Krish...
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 7 months ago
Quasi-friendly sup-interpretations
In a previous paper [16], the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static an...
Jean-Yves Marion, Romain Péchoux
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 7 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
IR
2008
13 years 7 months ago
Negation recognition in medical narrative reports
Substantial medical data, such as discharge summaries and operative reports are stored in electronic textual form. Databases containing free-text clinical narratives reports often...
Lior Rokach, Roni Romano, Oded Maimon