Sciweavers

9110 search results - page 1732 / 1822
» Formally-Based Design Evaluation
Sort
View
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CIKM
2003
Springer
14 years 3 months ago
Statistical transliteration for english-arabic cross language information retrieval
Out of vocabulary (OOV) words are problematic for cross language information retrieval. One way to deal with OOV words when the two languages have different alphabets, is to trans...
Nasreen Abdul Jaleel, Leah S. Larkey
ICMI
2003
Springer
131views Biometrics» more  ICMI 2003»
14 years 3 months ago
TorqueBAR: an ungrounded haptic feedback device
Kinesthetic feedback is a key mechanism by which people perceive object properties during their daily tasks – particularly inertial properties. For example, transporting a glass...
Colin Swindells, Alex Unden, Tao Sang
CF
2010
ACM
14 years 3 months ago
On-chip communication and synchronization mechanisms with cache-integrated network interfaces
Per-core local (scratchpad) memories allow direct inter-core communication, with latency and energy advantages over coherent cache-based communication, especially as CMP architect...
Stamatis G. Kavadias, Manolis Katevenis, Michail Z...
CLOUD
2010
ACM
14 years 3 months ago
Fluxo: a system for internet service programming by non-expert developers
Over the last 10–15 years, our industry has developed and deployed many large-scale Internet services, from e-commerce to social networking sites, all facing common challenges i...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
« Prev « First page 1732 / 1822 Last » Next »