Sciweavers

8177 search results - page 349 / 1636
» Detecting System Emulators
Sort
View
USS
2004
15 years 5 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
130
Voted
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 4 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
136
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Iteratively Detected Three-Stage Multi-Dimensional Sphere Packing Modulation Aided Multi-Functional MIMO
Abstract— This paper presents a novel multi-functional MultipleInput Multiple-Output (MIMO) scheme that combines the benefits of the Vertical Bell Labs Layered Space-Time (V-BLA...
Mohammed El-Hajjar, Osamah Alamri, Lajos Hanzo
139
Voted
WCNC
2008
IEEE
15 years 10 months ago
Three-Stage Serially Concatenated Codes and Iterative Center-Shifting K-Best Sphere Detection for SDM-OFDM: An EXIT Chart Aided
—Iterative K-best sphere detection (SD) and channel decoding is appealing, since it is capable of achieving a nearmaximum-a-posteriori (MAP) performance at a low complexity. Howe...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
155
Voted
FM
2009
Springer
134views Formal Methods» more  FM 2009»
15 years 1 months ago
Partial Order Reductions Using Compositional Confluence Detection
Abstract. Explicit state methods have proven useful in verifying safetycritical systems containing concurrent processes that run asynchronously and communicate. Such methods consis...
Frédéric Lang, Radu Mateescu