Sciweavers

543 search results - page 87 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
CCS
2010
ACM
14 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
EH
2005
IEEE
171views Hardware» more  EH 2005»
15 years 3 months ago
Implementation Results for a Fault-Tolerant Multicellular Architecture Inspired by Endocrine Communication
The hybrid redundancy structure found at the cellular level of higher animals provides complex organism with the three key features of a reliability-engineered system: fault toler...
Andrew J. Greensted, Andy M. Tyrrell
DFT
2006
IEEE
130views VLSI» more  DFT 2006»
15 years 3 months ago
Off-Chip Control Flow Checking of On-Chip Processor-Cache Instruction Stream
Control flow checking (CFC) is a well known concurrent checking technique for ensuring that a program’s instruction execution sequence follows permissible paths. Almost all CFC...
Federico Rota, Shantanu Dutt, Sahithi Krishna
MONET
2007
95views more  MONET 2007»
14 years 9 months ago
A Pervasive Computing System for the Operating Room of the Future
We describe a prototype Context Aware Perioperative Information System to capture and interpret data in an operating room of the future. The captured data is used to construct the...
Sheetal K. Agarwal, Anupam Joshi, Timothy W. Finin...
INFOCOM
2006
IEEE
15 years 3 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...