Sciweavers

1774 search results - page 222 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
SAC
2009
ACM
14 years 4 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
VRST
2009
ACM
14 years 3 months ago
A semantic environment model for crowd simulation in multilayered complex environment
Simulating crowds in complex environment is fascinating and challenging, however, modeling of the environment is always neglected in the past, which is one of the essential proble...
Hao Jiang, Wenbin Xu, Tianlu Mao, Chunpeng Li, Shi...
DAC
2006
ACM
14 years 10 months ago
Synthesis of high-performance packet processing pipelines
Packet editing is a fundamental building block of data communication systems such as switches and routers. Circuits that implement this function are critical and define the featur...
Cristian Soviani, Ilija Hadzic, Stephen A. Edwards
CHI
2007
ACM
14 years 9 months ago
Dynamic detection of novice vs. skilled use without a task model
If applications were able to detect a user's expertise, then software could automatically adapt to better match expertise. Detecting expertise is difficult because a user...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
PAKDD
2000
ACM
128views Data Mining» more  PAKDD 2000»
14 years 22 days ago
Efficient Detection of Local Interactions in the Cascade Model
Detection of interactions among data items constitutes an essential part of knowledge discovery. The cascade model is a rule induction methodology using levelwise expansion of a la...
Takashi Okada