Sciweavers

282 search results - page 12 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
DSN
2006
IEEE
15 years 3 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
93
Voted
FCSC
2007
130views more  FCSC 2007»
14 years 9 months ago
An improved algorithm for finding community structure in networks with an application to IPv6 backbone network
The discovery of community structure in a large number of complex networks has attracted lots of interest in recent years. One category of algorithms for detecting community struct...
Yingxin Guo, Ke Xu
SIGOPS
2010
91views more  SIGOPS 2010»
14 years 8 months ago
Why panic()?: improving reliability with restartable file systems
The file system is one of the most critical components of the operating system. Almost all applications running in the operating system require file systems to be available for ...
Swaminathan Sundararaman, Sriram Subramanian, Abhi...
HPCA
2003
IEEE
15 years 10 months ago
Dynamic Data Dependence Tracking and its Application to Branch Prediction
To continue to improve processor performance, microarchitects seek to increase the effective instruction level parallelism (ILP) that can be exploited in applications. A fundament...
Lei Chen, Steve Dropsho, David H. Albonesi
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 3 months ago
Stochastic RED and Its Applications
Abstract— In this paper, we present a novel fair queue management algorithm called Stochastic RED (StoRED), inspired by the well known stochastic fair queuing and based on the ra...
Shan Chen, Zhen Zhou, Brahim Bensaou