Sciweavers

201 search results - page 34 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
97
Voted
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
15 years 7 months ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 3 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
104
Voted
AMM
2011
118views more  AMM 2011»
14 years 6 months ago
From Community Detection to Mentor Selection in Rating-Free Collaborative Filtering
—The number of resources or items that users can now access when navigating on the Web or using e-services, is so huge that these might feel lost due to the presence of too much ...
Armelle Brun, Sylvain Castagnos, Anne Boyer
BIOINFORMATICS
2010
116views more  BIOINFORMATICS 2010»
14 years 11 months ago
A principal skeleton algorithm for standardizing confocal images of fruit fly nervous systems
Motivation: The fruit fly (Drosophila melanogaster) is a commonly used model organism in biology. We are currently building a 3D digital atlas of the fruit fly larval nervous syst...
Lei Qu, Hanchuan Peng
IPPS
2008
IEEE
15 years 5 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...