Sciweavers

31686 search results - page 115 / 6338
» Resource typing in Guru
Sort
View
POPL
2003
ACM
14 years 9 months ago
Static prediction of heap space usage for first-order functional programs
We show how to efficiently obtain linear a priori bounds on the heap space consumption of first-order functional programs. The analysis takes space reuse by explicit deallocation ...
Martin Hofmann, Steffen Jost
IEEEARES
2006
IEEE
14 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
WETICE
2006
IEEE
14 years 3 months ago
On Representing Instance Changes in Adaptive Process Management Systems
By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. Howeve...
Stefanie Rinderle, Ulrich Kreher, Markus Lauer, Pe...
SASN
2003
ACM
14 years 2 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
WMTE
2002
IEEE
14 years 1 months ago
Applying Wireless Technologies to Build a Highly Interactive Learning Environment
This study tries to apply wireless technologies to build a highly interactive environment. For this purpose, this study first identifies four types of interaction between the memb...
Tzu-Chien Liu, Hsue-Yie Wang, Jen-Kai Liang, Tak-W...