Sciweavers

9494 search results - page 1678 / 1899
» Gaussian Process Networks
Sort
View
ISVC
2007
Springer
15 years 10 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
IWINAC
2007
Springer
15 years 10 months ago
Evolving Robot Behaviour at Micro (Molecular) and Macro (Molar) Action Level
We investigate how it is possible to shape robot behaviour adopting a molecular or molar point of view. These two ways to approach the issue are inspired by Learning Psychology, wh...
Michela Ponticorvo, Orazio Miglino
MIDDLEWARE
2007
Springer
15 years 10 months ago
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines
This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The...
Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, J...
POLICY
2007
Springer
15 years 10 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
« Prev « First page 1678 / 1899 Last » Next »