Sciweavers

147 search results - page 17 / 30
» Model-based Systems Analysis Using CSIM18
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
KES
2006
Springer
13 years 7 months ago
Fuzzy-Evolutionary Synergism in an Intelligent Medical Diagnosis System
In this paper, we present the design, implementation and evaluation of HIGAS, a hybrid intelligent system that deals with diagnosis and treatment consultation of acid-base disturba...
Constantinos Koutsojannis, Ioannis Hatzilygeroudis
CIVR
2004
Springer
111views Image Analysis» more  CIVR 2004»
14 years 24 days ago
An Inference Network Approach to Image Retrieval
Most image retrieval systems only allow a fragment of text or an example image as a query. Most users have more complex information needs that are not easily expressed in either of...
Donald Metzler, R. Manmatha
IDEAS
1997
IEEE
237views Database» more  IDEAS 1997»
13 years 11 months ago
Sequence Comparison Using a Relational Database Approach
A variety of heterogenous data sources is available in the field of molecular biology. Our focus lies on the biological sequence data, i. e. data maintained in collections like EM...
André Bergholz, Stephan Heymann, Jörg ...
DMS
2008
167views Multimedia» more  DMS 2008»
13 years 8 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far