Sciweavers

2874 search results - page 538 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICAC
2007
IEEE
14 years 1 months ago
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine
Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
Yi-Min Wang, Ming Ma
ASPDAC
2004
ACM
94views Hardware» more  ASPDAC 2004»
14 years 1 months ago
Improving simulation-based verification by means of formal methods
The design of complex systems is largely ruled by the time needed for verification. Even though formal methods can provide higher reliability, in practice often simulation based ve...
Görschwin Fey, Rolf Drechsler
BPM
2004
Springer
95views Business» more  BPM 2004»
14 years 1 months ago
On Dealing with Structural Conflicts between Process Type and Instance Changes
Abstract. Adaptive process management systems must be able to support changes of single process instances as well as modifications at the process type level and their propagation t...
Stefanie Rinderle, Manfred Reichert, Peter Dadam
AFRIGRAPH
2001
ACM
14 years 1 months ago
A gesture processing framework for multimodal interaction in virtual reality
This article presents a gesture detection and analysis framework for modelling multimodal interactions. It is particulary designed for its use in Virtual Reality (VR) applications...
Marc Erich Latoschik
VLDB
1991
ACM
104views Database» more  VLDB 1991»
14 years 1 months ago
A Metadata Approach to Resolving Semantic Conflicts
In this paper we describe a rule-based approach to semantic specification that can be used to establish semantic agreement between a source and receiver. Query processing techniqu...
Michael Siegel, Stuart E. Madnick