Sciweavers

3785 search results - page 177 / 757
» Immune System Based Intrusion Detection System
Sort
View
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
15 years 10 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná
ICASSP
2011
IEEE
14 years 8 months ago
Online anomaly detection with expert system feedback in social networks
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists...
Corinne Horn, Rebecca Willett
176
Voted
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 11 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
156
Voted
ASPLOS
2011
ACM
14 years 8 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...
113
Voted
SIGIR
2008
ACM
15 years 4 months ago
Detecting synonyms in social tagging systems to improve content retrieval
Collaborative tagging used in online social content systems is naturally characterized by many synonyms, causing low precision retrieval. We propose a mechanism based on user pref...
Maarten Clements, Arjen P. de Vries, Marcel J. T. ...