Sciweavers

2546 search results - page 386 / 510
» Designing the Future
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
AHS
2006
IEEE
95views Hardware» more  AHS 2006»
15 years 8 months ago
A Modular Framework for the Evolution of Circuits on Configurable Transistor Array Architectures
This paper gives an overview over the progress that has been made by the Heidelberg FPTA group within the field of analog evolvable hardware. Achievements are the design of a CMOS...
Martin Trefzer, Jörg Langeheine, Karlheinz Me...
CCGRID
2004
IEEE
15 years 8 months ago
Routing and resource discovery in Phoenix Grid-enabled message passing library
We describe design and implementation of a "Gridenabled" message passing library, in the context of Phoenix message passing model. It supports (1) message routing betwee...
Kenji Kaneda, Kenjiro Taura, Akinori Yonezawa
CCGRID
2004
IEEE
15 years 8 months ago
Learning Grid technologies in a project-based computer architecture course
This paper describes the integration of the grid topic within a Computer Architecture engineering course. Students are engaged in a project of design and evaluation of computing s...
Guillermo Vega-Gorgojo, Yannis A. Dimitriadis, Edu...
APWEB
2006
Springer
15 years 8 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa