Sciweavers

773 search results - page 120 / 155
» Report on a Practical Application of ASMs in Software Design
Sort
View
ETRICS
2006
14 years 12 days ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
EOR
2007
90views more  EOR 2007»
13 years 8 months ago
Tabu search and GRASP for the maximum diversity problem
In this paper, we develop new heuristic procedures for the maximum diversity problem (MDP). This NPhard problem has a significant number of practical applications such as environm...
Abraham Duarte, Rafael Martí
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 11 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
KBSE
2007
IEEE
14 years 3 months ago
Scalable automatic test data generation from modeling diagrams
We explore the automatic generation of test data that respect constraints expressed in the Object-Role Modeling (ORM) language. ORM is a popular conceptual modeling language, prim...
Yannis Smaragdakis, Christoph Csallner, Ranjith Su...
MOBISYS
2008
ACM
14 years 8 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...