Sciweavers

105 search results - page 14 / 21
» Encoding Intensional Type Analysis
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
ICDAR
2009
IEEE
14 years 2 months ago
Utilizing Consistency Context for Handwritten Mathematical Expression Recognition
This paper presents a rule-based approach that utilizes some types of contextual information to improve the accuracy of handwritten mathematical expression(ME) recognition. Mining...
Kang Kim, Taik-Heon Rhee, Jae Seung Lee, Jin Hyung...
NDSS
2008
IEEE
14 years 1 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
INTERACT
2007
13 years 9 months ago
Face-to-Face Sociability Signs Made Explicit in CMC
This paper discusses how semiotic engineering can support the formulation of problems and solutions involved in handling face-to-face (F2F) sociability models in computer-mediated ...
Carla Faria Leitão, Clarisse Sieckenius de ...
BMCBI
2006
159views more  BMCBI 2006»
13 years 7 months ago
ProtRepeatsDB: a database of amino acid repeats in genomes
Background: Genome wide and cross species comparisons of amino acid repeats is an intriguing problem in biology mainly due to the highly polymorphic nature and diverse functions o...
Mridul K. Kalita, Gowthaman Ramasamy, Sekhar Durai...