Sciweavers

2205 search results - page 198 / 441
» Mutation Operators for Specifications
Sort
View
USS
2004
15 years 3 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
131
Voted
WSC
1997
15 years 3 months ago
Making Better Manufacturing Decisions with AIM
FACTOR/AIM (AIM) is a simulation system designed specifically for use in manufacturing decision support. AIM has been successfully applied to engineering design, scheduling, and p...
Julie N. Ehrlich, William R. Lilegdon
142
Voted
ML
2002
ACM
123views Machine Learning» more  ML 2002»
15 years 2 months ago
Feature Generation Using General Constructor Functions
Most classification algorithms receive as input a set of attributes of the classified objects. In many cases, however, the supplied set of attributes is not sufficient for creatin...
Shaul Markovitch, Dan Rosenstein
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
15 years 12 days ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
107
Voted
ICIP
2004
IEEE
16 years 4 months ago
Image content-based active sensor planning for a mobile trinocular active vision system
In this paper, we present a sensor planning approach for a mobile trinocular active vision system. At the stationary state (i.e., no motion) the sensor planning system calculates ...
Aly A. Farag, Alaa E. Abdel-Hakim