Sciweavers

1424 search results - page 96 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
14 years 5 months ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
NDSS
2007
IEEE
14 years 2 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
ASPLOS
1996
ACM
14 years 10 days ago
An Integrated Compile-Time/Run-Time Software Distributed Shared Memory System
On a distributed memory machine, hand-coded message passing leads to the most efficient execution, but it is difficult to use. Parallelizing compilers can approach the performance...
Sandhya Dwarkadas, Alan L. Cox, Willy Zwaenepoel
VL
2007
IEEE
134views Visual Languages» more  VL 2007»
14 years 2 months ago
A Comprehensive Evaluation of Workspace Awareness in Software Configuration Management Systems
Workspace awareness has emerged as a new coordination paradigm in software configuration management systems, enabling the early detection of potential conflicts by providing devel...
Anita Sarma, André van der Hoek, David F. R...
IJMMS
2008
108views more  IJMMS 2008»
13 years 8 months ago
Ontology-based information extraction and integration from heterogeneous data sources
In this paper we present the design, implementation and evaluation of SOBA, a system for ontology-based information extraction from heterogeneous data resources, including plain t...
Paul Buitelaar, Philipp Cimiano, Anette Frank, Mat...