Sciweavers

1804 search results - page 340 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SAC
2011
ACM
12 years 11 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
ISLPED
1995
ACM
131views Hardware» more  ISLPED 1995»
14 years 9 days ago
Guarded evaluation: pushing power management to logic synthesis/design
The need to reduce the power consumption of the next generation of digital systems is clearly recognized. At the system level, power management is a very powerful technique and de...
Vivek Tiwari, Sharad Malik, Pranav Ashar
CIKM
2009
Springer
14 years 3 months ago
Group CRM: a new telecom CRM framework from social network perspective
The structure of customer communication network provides us a natural way to understand customers’ relationships. Traditional customer relationship management (CRM) methods focu...
Bin Wu, Qi Ye, Shengqi Yang, Bai Wang
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
14 years 9 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
SEFM
2007
IEEE
14 years 3 months ago
An AOP Extended Lambda-Calculus
This paper presents an implicitly-typed functional, aspect-oriented programming language: λ AOP. The main contribution of the paper is a semantics for λ AOP advice weaving. The ...
Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Pr...