Sciweavers

3260 search results - page 14 / 652
» MYSEA Technology Demonstration
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
13 years 11 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
FLAIRS
2008
13 years 9 months ago
Graph Grammars: An ITS Technology for Diagram Representations
For many educational applications such as learning tools for argumentation, structured diagrams are a suitable form of external representation. However, student-created graphs pos...
Niels Pinkwart, Kevin D. Ashley, Vincent Aleven, C...
AAAI
2004
13 years 8 months ago
Identifying Terrorist Activity with AI Plan Recognition Technology
We describe the application of plan recognition techniques to support human intelligence analysts in processing national security alert sets by automatically identifying the hosti...
Peter Jarvis, Teresa F. Lunt, Karen L. Myers
DAGSTUHL
2006
13 years 8 months ago
Bridging the Gap between Relocatability and Available Technology: The Erlangen Slot Machine
We present an FPGA-based reconfigurable platform called Erlangen Slot Machine (ESM). The main advantages of this platform are: First, the possibility for each module to access peri...
Diana Göhringer, Mateusz Majer, Jürgen T...
CASCON
1997
97views Education» more  CASCON 1997»
13 years 8 months ago
Using shim technology to monitor DCE runtime performance
Obtaining performance data for application or system software is typically di cult, especially when the source code is not available. While popular techniques such as event trappi...
Gregory M. Oster, Richard B. Bunt