Sciweavers

4745 search results - page 909 / 949
» Discretization: An Enabling Technique
Sort
View
NDSS
2000
IEEE
14 years 10 days ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
ICCS
1997
Springer
14 years 9 days ago
Uncovering the Conceptual Models in Ripple Down Rules
: The need for analysis and modeling of knowledge has been espoused by many researchers as a prerequisite to building knowledge based systems (KBS). This approach has done little t...
Debbie Richards, Paul Compton
SIGGRAPH
1997
ACM
14 years 9 days ago
Object shape and reflectance modeling from observation
An object model for computer graphics applications should contain two aspects of information: shape and reflectance properties of the object. A number of techniques have been deve...
Yoichi Sato, Mark D. Wheeler, Katsushi Ikeuchi
TAPSOFT
1995
Springer
14 years 9 days ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg
ASPLOS
2010
ACM
14 years 2 days ago
Fairness via source throttling: a configurable and high-performance fairness substrate for multi-core memory systems
Cores in a chip-multiprocessor (CMP) system share multiple hardware resources in the memory subsystem. If resource sharing is unfair, some applications can be delayed significantl...
Eiman Ebrahimi, Chang Joo Lee, Onur Mutlu, Yale N....