Sciweavers

2407 search results - page 476 / 482
» Design considerations for network processor operating system...
Sort
View
134
Voted
JCS
2002
100views more  JCS 2002»
15 years 2 months ago
STATL: An Attack Language for State-Based Intrusion Detection
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
Steve T. Eckmann, Giovanni Vigna, Richard A. Kemme...
197
Voted
HCI
2009
15 years 17 days ago
Mind-Mirror: EEG-Guided Image Evolution
Abstract. We propose a brain-computer interface (BCI) system for evolving images in realtime based on subject feedback derived from electroencephalography (EEG). The goal of this s...
Nima Bigdely Shamlo, Scott Makeig
132
Voted
EDBT
2010
ACM
145views Database» more  EDBT 2010»
15 years 6 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre
139
Voted
COOPIS
2002
IEEE
15 years 7 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
106
Voted
WWW
2005
ACM
16 years 3 months ago
WebPod: persistent Web browsing sessions with pocketable storage devices
We present WebPod, a portable system that enables mobile users to use the same persistent, personalized web browsing session on any Internet-enabled device. No matter what compute...
Shaya Potter, Jason Nieh