Sciweavers

7047 search results - page 1259 / 1410
» Focusing on Binding and Computation
Sort
View
RAID
1999
Springer
14 years 2 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
SIGUCCS
1998
ACM
14 years 2 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
HYBRID
1998
Springer
14 years 2 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
ICS
1998
Tsinghua U.
14 years 2 months ago
Load Execution Latency Reduction
In order to achieve high performance, contemporary microprocessors must effectively process the four major instruction types: ALU, branch, load, and store instructions. This paper...
Bryan Black, Brian Mueller, Stephanie Postal, Ryan...
CHI
1997
ACM
14 years 2 months ago
MOBI-D: A Model-Based Development Environment for User-Centered Design
MOBI-D (Model-Based Interface Designer) is a software environment the design and development of user interfaces from declarative interface models. End-users informally describe ta...
Angel R. Puerta, David Maulsby
« Prev « First page 1259 / 1410 Last » Next »