Sciweavers

6274 search results - page 1138 / 1255
» Proofs, Programs, Processes
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
IEICET
2006
114views more  IEICET 2006»
13 years 10 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...
CIE
2007
Springer
13 years 10 months ago
Emotive captioning
Closed captioning has been enabling access to television for people who are deaf and hard of hearing since the early 1970s. Since that time, technology and people’s demands have...
Daniel G. Lee, Deborah I. Fels, John Patrick Udo
IJHPCA
2006
117views more  IJHPCA 2006»
13 years 10 months ago
Recent Developments in Gridsolve
The purpose of GridSolve is to create the middleware necessary to provide a seamless bridge between the simple, standard programming interfaces and desktop systems that dominate t...
Asim YarKhan, Keith Seymour, Kiran Sagi, Zhiao Shi...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 10 months ago
SWI-Prolog and the Web
Prolog is an excellent tool for representing and manipulating data written in formal languages as well as natural language. Its safe semantics and automatic memory management make...
Jan Wielemaker, Zhisheng Huang, Lourens van der Me...
« Prev « First page 1138 / 1255 Last » Next »