Sciweavers

1804 search results - page 330 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICSE
2003
IEEE-ACM
14 years 8 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
AIMSA
1990
Springer
14 years 25 days ago
Compilation of Recursive Two-Literal Clauses into Unification Algorithms
: Automated deduction systems can considerably be improved by replacing axioms with special purpose inference mechanisms. For example replacing in resolution based systems certain ...
Hans Jürgen Ohlbach
ECIR
2009
Springer
14 years 6 months ago
Word Particles Applied to Information Retrieval
Document retrieval systems conventionally use words as the basic unit of representation, a natural choice since words are primary carriers of semantic information. In this paper w...
Evandro B. Gouvêa, Bhiksha Raj
ICNP
2005
IEEE
14 years 2 months ago
Robust Multiclass Signaling Overload Control
We propose multi-class signaling overload control algorithms, for telecommunication switches, that are robust against different input traffic patterns and system upgrades. In ord...
Sneha Kumar Kasera, José Pinheiro, Catherin...
ANLP
1997
92views more  ANLP 1997»
13 years 10 months ago
CommandTalk: A Spoken-Language Interface for Battlefield Simulations
CommandTalk is a spoken-language interface to battlefield simulations that allows the use of ordinary spoken English to create forces and control measures, assign missions to forc...
Robert C. Moore, John Dowding, Harry Bratt, Jean M...