Sciweavers

1804 search results - page 143 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
15 years 4 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
APSEC
2002
IEEE
15 years 9 months ago
Integrating Use-Case Analysis and Task Analysis for Interactive Systems
This paper presents an integrated process model of use-case driven analysis and task analysis for developing interactive systems. In the process model, an analysis model is develo...
Soon-Kyeong Kim, David A. Carrington
APIN
2010
172views more  APIN 2010»
15 years 4 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...
FGR
2011
IEEE
340views Biometrics» more  FGR 2011»
14 years 7 months ago
Action unit detection using sparse appearance descriptors in space-time video volumes
— Recently developed appearance descriptors offer the opportunity for efficient and robust facial expression recognition. In this paper we investigate the merits of the family o...
Bihan Jiang, Michel François Valstar, Maja ...
WCRE
2003
IEEE
15 years 9 months ago
Detecting Merging and Splitting using Origin Analysis
Merging and splitting source code artifacts is a common activity during the lifespan of a software system; as developers rethink the essential structure of a system or plan for a ...
Lijie Zou, Michael W. Godfrey