Sciweavers

3785 search results - page 144 / 757
» Immune System Based Intrusion Detection System
Sort
View
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
15 years 10 months ago
Sufficiency verification of HIV-1 pathogenesis based on multi-agent simulation
Researchers of HIV-1 are today, still unable to determine exactly the biological mechanisms that cause AIDS. Various mechanisms have been hypothesized and their existences have be...
Zaiyi Guo, Hann Kwang Han, Joc Cing Tay
CCS
2008
ACM
15 years 6 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
DAC
2012
ACM
13 years 7 months ago
Towards fault-tolerant embedded systems with imperfect fault detection
Many state-of-the-art approaches on fault-tolerant system design make the simplifying assumption that all faults are detected within a certain time interval. However, based on a d...
Jia Huang, Kai Huang, Andreas Raabe, Christian Buc...
ICDCS
1999
IEEE
15 years 9 months ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan
159
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 8 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna