Results 1 - 10
of
2,284
A Modern Paradigm
"... The Quality Assurance Project (QAP) is funded by the U.S. Agency for International Development (USAID), under Contract Number HRN-C-00-96-90013. QAP serves countries eligible for USAID assistance, USAID Missions and Bureaus, and other agencies and nongovernmental organizations that cooperate with US ..."
Abstract
- Add to MetaCart
The Quality Assurance Project (QAP) is funded by the U.S. Agency for International Development (USAID), under Contract Number HRN-C-00-96-90013. QAP serves countries eligible for USAID assistance, USAID Missions and Bureaus, and other agencies and nongovernmental organizations that cooperate with USAID. The QAP team consists of prime contractor Center for Human Services
Universally composable security: A new paradigm for cryptographic protocols
, 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract
-
Cited by 833 (37 self)
- Add to MetaCart
in complex and unpredictable environments such as modern communication networks.
Non-Uniform Random Variate Generation
, 1986
"... This is a survey of the main methods in non-uniform random variate generation, and highlights recent research on the subject. Classical paradigms such as inversion, rejection, guide tables, and transformations are reviewed. We provide information on the expected time complexity of various algorith ..."
Abstract
-
Cited by 1021 (26 self)
- Add to MetaCart
This is a survey of the main methods in non-uniform random variate generation, and highlights recent research on the subject. Classical paradigms such as inversion, rejection, guide tables, and transformations are reviewed. We provide information on the expected time complexity of various
Intrusion Detection using Sequences of System Calls
- Journal of Computer Security
, 1998
"... A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs. Normal behavio ..."
Abstract
-
Cited by 396 (15 self)
- Add to MetaCart
analyzed for false positives. 1 Introduction Modern computer systems are plagued by security vulnerabilities. Whether it is the latest UNIX buffer overflow or bug in Microsoft Internet Explorer, our applications and operating systems are full of security flaws on many levels. From the viewpoint
Sampling—50 years after Shannon
- Proceedings of the IEEE
, 2000
"... This paper presents an account of the current state of sampling, 50 years after Shannon’s formulation of the sampling theorem. The emphasis is on regular sampling, where the grid is uniform. This topic has benefited from a strong research revival during the past few years, thanks in part to the math ..."
Abstract
-
Cited by 339 (27 self)
- Add to MetaCart
to the mathematical connections that were made with wavelet theory. To introduce the reader to the modern, Hilbert-space formulation, we reinterpret Shannon’s sampling procedure as an orthogonal projection onto the subspace of band-limited functions. We then extend the standard sampling paradigm for a representation
Towards a modern theory of adaptive networks: expectation and prediction
- Psychol. Rev
, 1981
"... Many adaptive neural network theories are based on neuronlike adaptive elements that can behave as single unit analogs of associative conditioning. In this article we develop a similar adaptive element, but one which is more closely in accord with the facts of animal learning theory than elements co ..."
Abstract
-
Cited by 282 (18 self)
- Add to MetaCart
and biochemistry of synaptic mechanisms. One way to bridge the gap between behavioral and neural views of learning is to postulate neural analogs of behavioral modification paradigms. Hebb's suggestion that when a cell A repeatedly and persistently takes part in firing another cell B, then A's efficiency
The danger model: A renewed sense of self
- Science
, 2002
"... For over 50 years immunologists have based their thoughts, experiments, and clinical treatments on the idea that the immune system functions by making a distinction between self and nonself. Although this paradigm has often served us well, years of detailed examination have revealed a number of inhe ..."
Abstract
-
Cited by 325 (0 self)
- Add to MetaCart
For over 50 years immunologists have based their thoughts, experiments, and clinical treatments on the idea that the immune system functions by making a distinction between self and nonself. Although this paradigm has often served us well, years of detailed examination have revealed a number
Service-oriented computing
- Communications of the ACM
, 2003
"... Service-Oriented Computing (SOC) is a new computing paradigm that utilizes services as the basic constructs to support the development of rapid, low-cost and easy composition of distributed applications even in heterogeneous environments. The visionary promise of Service-Oriented Computing is a worl ..."
Abstract
-
Cited by 306 (10 self)
- Add to MetaCart
Service-Oriented Computing (SOC) is a new computing paradigm that utilizes services as the basic constructs to support the development of rapid, low-cost and easy composition of distributed applications even in heterogeneous environments. The visionary promise of Service-Oriented Computing is a
System-level design: Orthogonalization of concerns and platform-based design
- IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
, 2000
"... System-level design issues become critical as implementation technology evolves toward increasingly complex integrated circuits and the time-to-market pressure continues relentlessly. To cope with these issues, new methodologies that emphasize re-use at all levels of abstraction are a “must”, and th ..."
Abstract
-
Cited by 272 (10 self)
- Add to MetaCart
them nearly independent so that complexity could be mastered. In this domain, architecture-function co-design and communication-based design are introduced and motivated. Platforms are essential elements of this design paradigm. We define system platforms and we argue about their use and relevance
Mining Process Models from Workflow Logs
, 1998
"... Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given ..."
Abstract
-
Cited by 264 (3 self)
- Add to MetaCart
Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given
Results 1 - 10
of
2,284