Sciweavers

1688 search results - page 282 / 338
» The Complexity of Rationalizing Matchings
Sort
View
FORTE
2004
13 years 11 months ago
A Temporal Logic Based Framework for Intrusion Detection
Abstract. We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications. We specify intrusion patterns as formulas in an expre...
Prasad Naldurg, Koushik Sen, Prasanna Thati
PICS
2001
13 years 11 months ago
Dot Placement Analysis Using a Line Scan Camera and Rigid Body Rotation
Printer manufacturers design print heads and halftone patterns to result in specific types of image characteristics. Many image quality artifacts are a result of differences in ac...
Yair Kipman, Kate Johnson
TREC
2004
13 years 11 months ago
UIC at TREC 2004: Robust Track
In TREC 2004, the Database and Information System Lab (DBIS) at University of Illinois at Chicago (UIC) participates in the robust track, which is a traditional ad hoc retrieval t...
Shuang Liu, Chaojing Sun, Clement T. Yu
USITS
2003
13 years 11 months ago
Network-Sensitive Service Discovery
We consider the problem of network-sensitive service selection (NSSS): finding services that match a particular set of functional and network properties. Current solutions handle...
An-Cheng Huang, Peter Steenkiste
CASCON
1997
85views Education» more  CASCON 1997»
13 years 11 months ago
Fast detection of communication patterns in distributed executions
Understanding distributed applications is a tedious and di cult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the executio...
Thomas Kunz, Michiel F. H. Seuren