Sciweavers

1021 search results - page 139 / 205
» Pure Subtype Systems
Sort
View
CASES
2005
ACM
13 years 10 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
IJSEKE
2006
99views more  IJSEKE 2006»
13 years 8 months ago
Weaving Deployment Aspects into Domain-specific Models
pecific models increase the level of abstraction used to develop large-scale component-based systems. Model-driven development (MDD) approaches (e.g., ModelIntegrated Computing and...
Krishnakumar Balasubramanian, Aniruddha S. Gokhale...
ACMSE
2008
ACM
13 years 10 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
CVPR
2008
IEEE
14 years 10 months ago
Decomposition, discovery and detection of visual categories using topic models
We present a novel method for the discovery and detection of visual object categories based on decompositions using topic models. The approach is capable of learning a compact and...
Mario Fritz, Bernt Schiele
SIGMOD
2007
ACM
147views Database» more  SIGMOD 2007»
14 years 8 months ago
Extending relational query optimization to dynamic schemas for information integration in multidatabases
This paper extends relational processing and optimization to the FISQL/FIRA languages for dynamic schema queries over multidatabases. Dynamic schema queries involve the creation a...
Catharine M. Wyss, Felix I. Wyss