Sciweavers

9494 search results - page 1568 / 1899
» Gaussian Process Networks
Sort
View
RAID
2007
Springer
15 years 11 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
TSD
2007
Springer
15 years 11 months ago
Inter-speaker Synchronization in Audiovisual Database for Lip-Readable Speech to Animation Conversion
The present study proposes an inter-speaker audiovisual synchronization method to decrease the speaker dependency of our direct speech to animation conversion system. Our aim is to...
Gergely Feldhoffer, Balázs Oroszi, Gyö...
ACSAC
2006
IEEE
15 years 11 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
BROADNETS
2006
IEEE
15 years 11 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
CLUSTER
2006
IEEE
15 years 11 months ago
Positioning Dynamic Storage Caches for Transient Data
Simulations, experiments and observatories are generating a deluge of scientific data. Even more staggering is the ever growing application demand to process and assimilate these...
Sudharshan S. Vazhkudai, Douglas Thain, Xiaosong M...
« Prev « First page 1568 / 1899 Last » Next »