Sciweavers

19587 search results - page 3894 / 3918
» Systems Engineering for software Engineers
Sort
View
CCS
2003
ACM
14 years 4 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
14 years 4 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano
ICARCV
2002
IEEE
166views Robotics» more  ICARCV 2002»
14 years 3 months ago
Similarity measure determination from NURBS-warping method
With the advances in digital imagery, large accessible data storage, internet repositories, and image applications, information conveyed through images is gaining in importance. T...
Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
14 years 3 months ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
VISUALIZATION
2002
IEEE
14 years 3 months ago
Comparative Evaluation of Visualization and Experimental Results Using Image Comparison Metrics
Comparative evaluation of visualization and experiment results is a critical step in computational steering. In this paper, we present a study of image comparison metrics for quan...
Hualin Zhou, Min Chen, Mike F. Webster
« Prev « First page 3894 / 3918 Last » Next »