Sciweavers

18016 search results - page 3537 / 3604
» Data Mining - Concepts and Techniques
Sort
View
ACSAC
2003
IEEE
14 years 16 days ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
ISSTA
2010
ACM
14 years 15 days ago
Analyzing concurrency bugs using dual slicing
Recently, there has been much interest in developing analyzes to detect concurrency bugs that arise because of data races, atomicity violations, execution omission, etc. However, ...
Dasarath Weeratunge, Xiangyu Zhang, William N. Sum...
CVPR
2000
IEEE
14 years 14 days ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...
ERCIMDL
2000
Springer
140views Education» more  ERCIMDL 2000»
14 years 14 days ago
Associative and Spatial Relationships in Thesaurus-Based Retrieval
The OASIS (Ontologically Augmented Spatial Information System) project explores terminology systems for thematic and spatial access in digital library applications. A prototype im...
Harith Alani, Christopher B. Jones, Douglas Tudhop...
ICALP
2000
Springer
14 years 14 days ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
« Prev « First page 3537 / 3604 Last » Next »