Sciweavers

3335 search results - page 637 / 667
» Grid result checking
Sort
View
IWIA
2005
IEEE
15 years 5 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
TPHOL
2005
IEEE
15 years 5 months ago
A HOL Theory of Euclidean Space
We describe a formalization of the elementary algebra, topology and analysis of finite-dimensional Euclidean space in the HOL Light theorem prover. (Euclidean space is RN with the...
John Harrison
MIR
2005
ACM
197views Multimedia» more  MIR 2005»
15 years 5 months ago
Enhanced ontologies for video annotation and retrieval
A typical way to perform video annotation requires to classify video elements (e.g. events and objects) according to some pre-defined ontology of the video content domain. Ontolo...
Marco Bertini, Alberto Del Bimbo, Carlo Torniai
STORAGESS
2005
ACM
15 years 5 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
AADEBUG
2005
Springer
15 years 5 months ago
Tdb: a source-level debugger for dynamically translated programs
Debugging techniques have evolved over the years in response to changes in programming languages, implementation techniques, and user needs. A new type of implementation vehicle f...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa