Sciweavers

3785 search results - page 651 / 757
» Immune System Based Intrusion Detection System
Sort
View
EUROSYS
2010
ACM
16 years 1 months ago
Execution Synthesis: A Technique for Automated Software Debugging
Debugging real systems is hard, requires deep knowledge of the code, and is time-consuming. Bug reports rarely provide sufficient information, thus forcing developers to turn int...
Cristian Zamfir, George Candea
ESOP
2001
Springer
15 years 9 months ago
On the Complexity of Constant Propagation
Constant propagation (CP) is one of the most widely used optimizations in practice (cf. [9]). Intuitively, it addresses the problem of statically detecting whether an expression al...
Markus Müller-Olm, Oliver Rüthing
135
Voted
ESORICS
2010
Springer
15 years 4 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
JSA
2006
167views more  JSA 2006»
15 years 4 months ago
Pattern-driven prefetching for multimedia applications on embedded processors
Multimedia applications in general and video processing, such as the MPEG4 Visual stream decoders, in particular are increasingly popular and important workloads for future embedd...
Hassan Sbeyti, Smaïl Niar, Lieven Eeckhout
158
Voted
MICCAI
2010
Springer
15 years 2 months ago
Biomarkers for Identifying First-Episode Schizophrenia Patients Using Diffusion Weighted Imaging
Recent advances in diffusion weighted MR imaging (dMRI) has made it a tool of choice for investigating white matter abnormalities of the brain and central nervous system. In this w...
Yogesh Rathi, James G. Malcolm, Oleg V. Michailovi...