Sciweavers

470 search results - page 53 / 94
» FORM facts
Sort
View
CASES
2005
ACM
14 years 7 days ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
BIS
2010
187views Business» more  BIS 2010»
13 years 11 months ago
Faceted Wikipedia Search
Wikipedia articles contain, besides free text, various types of structured information in the form of wiki markup. The type of wiki content that is most valuable for search are Wik...
Rasmus Hahn, Christian Bizer, Christopher Sahnwald...
NIPS
2007
13 years 11 months ago
Near-Maximum Entropy Models for Binary Neural Representations of Natural Images
Maximum entropy analysis of binary variables provides an elegant way for studying the role of pairwise correlations in neural populations. Unfortunately, these approaches suffer f...
Matthias Bethge, Philipp Berens
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
13 years 11 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
HCI
2001
13 years 11 months ago
Designing Internet-based systems and services for all: problems and solutions
: Most current electronic services do not address the breadth of design issues necessary to comply with `design-for-all' concepts, despite the fact that various design-for-all...
Panayiotis Koutsabasis, Jenny S. Darzentas, Julio ...