Sciweavers

1035 search results - page 184 / 207
» Cluster validation using information stability measures
Sort
View
55
Voted
ACSAC
2005
IEEE
15 years 3 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
66
Voted
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
15 years 3 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann
CLOUD
2010
ACM
15 years 2 months ago
Characterizing, modeling, and generating workload spikes for stateful services
Evaluating the resiliency of stateful Internet services to significant workload spikes and data hotspots requires realistic workload traces that are usually very difficult to obt...
Peter Bodík, Armando Fox, Michael J. Frankl...
FGR
2000
IEEE
112views Biometrics» more  FGR 2000»
15 years 2 months ago
A Probabilistic Sensor for the Perception of Activities
This paper presents a new technique for the perception of activities using statistical description of spatio-temporal properties. With this approach, the probability of an activit...
Olivier Chomat, James L. Crowley
RE
1999
Springer
15 years 1 months ago
An Integrated Scenario Management Strategy
Scenarios have proven effective for eliciting, describing and validating software requirements; however, scenario management continues to be a significant challenge to practition...
Thomas A. Alspaugh, Annie I. Antón, Tiffany...