Sciweavers

2236 search results - page 436 / 448
» Intrusion detection techniques and approaches
Sort
View
MICCAI
2002
Springer
14 years 8 months ago
Standardized Analysis of Intracranial Aneurysms Using Digital Video Sequences
CT-angiography is a well established medical imaging technique for the detection, evaluation and therapy planning of intracranial aneurysms. Different 3D visualization algorithms s...
Sabine Iserhardt-Bauer, Peter Hastreiter, Bernd To...
SIGSOFT
2008
ACM
14 years 8 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
WWW
2007
ACM
14 years 8 months ago
Csurf: a context-driven non-visual web-browser
Web sites are designed for graphical mode of interaction. Sighted users can "cut to the chase" and quickly identify relevant information in Web pages. On the contrary, i...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan
WWW
2004
ACM
14 years 8 months ago
Newsjunkie: providing personalized newsfeeds via analysis of information novelty
We present a principled methodology for filtering news stories by formal measures of information novelty, and show how the techniques can be used to custom-tailor newsfeeds based ...
Evgeniy Gabrilovich, Susan T. Dumais, Eric Horvitz
WWW
2004
ACM
14 years 8 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins