Sciweavers

201 search results - page 30 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
USENIX
2007
15 years 1 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
USS
2008
15 years 1 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
BMCBI
2008
154views more  BMCBI 2008»
14 years 11 months ago
Bayesian models and meta analysis for multiple tissue gene expression data following corticosteroid administration
Background: This paper addresses key biological problems and statistical issues in the analysis of large gene expression data sets that describe systemic temporal response cascade...
Yulan Liang, Arpad Kelemen
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
15 years 4 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
15 years 11 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden