Sciweavers

1210 search results - page 236 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
RAID
2009
Springer
14 years 2 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
IEEEPACT
2008
IEEE
14 years 1 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
RAM
2008
IEEE
124views Robotics» more  RAM 2008»
14 years 1 months ago
Mechatronics Considerations for Assisting Humans
Mechatronics technologies are now steadily penetrating in our daily lives. We are surrounded by mechatronic products and interact with them in many ways. In particular, mechatroni...
Masayoshi Tomizuka
3DIM
2007
IEEE
14 years 1 months ago
Robust 2D-3D alignment based on geometrical consistency
This paper presents a new registration algorithm of a 2D image and a 3D geometrical model, which is robust for initial registration errors, for reconstructing a realistic 3D model...
Kenji Hara, Yuuki Kabashima, Yumi Iwashita, Ryo Ku...
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov