Sciweavers

1804 search results - page 169 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
TIT
1998
72views more  TIT 1998»
15 years 4 months ago
Runlength Limited Codes for Single Error-Detection and Single Error-Correction with Mixed Type Errors
Abstract—Runlength-limited (RLL) codes are used in magnetic recording. The error patterns that occur with peak detection magnetic recording systems when using a runlength-limited...
Patrick Perry, Mingche Li, Mao Chao Lin, Zhen Zhan...
FPGA
2006
ACM
117views FPGA» more  FPGA 2006»
15 years 8 months ago
Context-free-grammar based token tagger in reconfigurable devices
In this paper, we present reconfigurable hardware architecture for detecting semantics of streaming data on 1+ Gbps networks. The design leverages on the characteristics of contex...
Young H. Cho, James Moscola, John W. Lockwood
ICSE
1993
IEEE-ACM
15 years 8 months ago
Automating the Detection of Reusable Parts in Existing Software
Wepresent a model based onan expert-systemapproach for the scavenging of reusable componentsfrom exis:ing software systems. We also describe a toolset called Code Miner that imple...
Michael F. Dunn, John C. Knight
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Modeling Urgency in Component-Based Real-Time Systems
A component-based realtime system is a simple model for the server-client relation with time constraints. This paper presents an efficient algorithm, called a blackbox testing algo...
Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa
IJNSEC
2010
98views more  IJNSEC 2010»
14 years 11 months ago
A Random Bit Generator Using Chaotic Maps
Chaotic systems have many interesting features such as sensitivity on initial condition and system parameter, ergodicity and mixing properties. In this paper, we exploit these int...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud