Sciweavers

2269 search results - page 294 / 454
» Behavioral Intrusion Detection
Sort
View
CHI
2005
ACM
16 years 5 months ago
Automating the detection of breaks in continuous user experience with computer games
This paper describes an approach towards automating the identification of design problems with three-dimensional mediated or gaming environments through the capture and query of u...
Tim Marsh, Kiyoung Yang, Cyrus Shahabi, Wee Ling W...
IWPC
2007
IEEE
15 years 11 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
143
Voted
ICTAC
2005
Springer
15 years 10 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
130
Voted
MOBICOM
2004
ACM
15 years 10 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
DSOM
2000
Springer
15 years 9 months ago
Operational Data Analysis: Improved Predictions Using Multi-computer Pattern Detection
Operational Data Analysis (ODA) automatically 1) monitors the performance of a computer through time, 2) stores such information in a data repository, 3) applies data-mining techn...
Ricardo Vilalta, Chidanand Apté, Sholom M. ...