Sciweavers

1804 search results - page 162 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DAC
2007
ACM
16 years 5 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
ACSAC
2006
IEEE
15 years 10 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
ASPLOS
2011
ACM
14 years 8 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...
FLAIRS
1998
15 years 5 months ago
Optimizing Production Manufacturing Using Reinforcement Learning
Manyindustrial processes involve makingparts with an assemblyof machines, where each machinecarries out an operation on a part, and the finished product requires a wholeseries of ...
Sridhar Mahadevan, Georgios Theocharous
VRST
2003
ACM
15 years 9 months ago
Time-critical collision detection using an average-case approach
We present a novel, generic framework and algorithm for hierarchical collision detection, which allows an application to balance speed and quality of the collision detection. We p...
Jan Klein, Gabriel Zachmann