Sciweavers

618 search results - page 101 / 124
» An Approach to Discover Dependencies between Service Operati...
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
84
Voted
SC
1995
ACM
15 years 1 months ago
Predicting Application Behavior in Large Scale Shared-memory Multiprocessors
In this paper we present an analytical-based framework for parallel program performance prediction. The main thrust of this work is to provide a means for treating realistic appli...
Karim Harzallah, Kenneth C. Sevcik
ICASSP
2010
IEEE
14 years 9 months ago
Wideband noise suppression supported by artificial bandwidth extension techniques
This contribution presents a wideband (50 Hz – 7 kHz) speech enhancement system that is operating in the frequency domain. As a novel feature, techniques known from artificial ...
Thomas Esch, Florian Heese, Bernd Geiser, Peter Va...
NOMS
2010
IEEE
154views Communications» more  NOMS 2010»
14 years 8 months ago
Extending a knowledge-based network to support temporal event reasoning
—While the polling or request/response paradigm adopted by many network and systems management approaches form the backbone of modern monitoring and management systems, the most ...
John Keeney, Clay Stevens, Declan O'Sullivan
SIGECOM
2008
ACM
188views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Predicting trusts among users of online communities: an epinions case study
Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users ...
Haifeng Liu, Ee-Peng Lim, Hady Wirawan Lauw, Minh-...