Sciweavers

7 search results - page 2 / 2
» Strategies for Prediction Under Imperfect Monitoring
Sort
View
IWCMC
2006
ACM
13 years 11 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
13 years 12 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang