Sciweavers

2702 search results - page 471 / 541
» Practically Applicable Formal Methods
Sort
View
ETRICS
2006
13 years 11 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ISCA
2000
IEEE
78views Hardware» more  ISCA 2000»
13 years 11 months ago
Vector instruction set support for conditional operations
Vector instruction sets are receiving renewed interest because of their applicability to multimedia. Current multimedia instruction sets use short vectors with SIMD implementation...
James E. Smith, Greg Faanes, Rabin A. Sugumar
OOPSLA
2000
Springer
13 years 11 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
ATAL
1995
Springer
13 years 11 months ago
The Architecture of an Agent Building Shell
The agent view provides maybe the right level of abstraction for dealing with complex, distribblem-solving systems. It abstracts from aspects like the hardware or software platfor...
Mihai Barbuceanu, Mark S. Fox
BTW
2009
Springer
133views Database» more  BTW 2009»
13 years 11 months ago
High-Dimensional Indexing for Multimedia Features
Abstract: Efficient content-based similarity search in large multimedia databases requires efficient query processing algorithms for many practical applications. Especially in hi...
Ira Assent, Stephan Günnemann, Hardy Kremer, ...