Sciweavers

1804 search results - page 214 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
ACSAC
2008
IEEE
15 years 11 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
179
Voted
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 11 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
MUE
2007
IEEE
134views Multimedia» more  MUE 2007»
15 years 11 months ago
An Efficient Voice Transcription Scheme for Music Retrieval
In this paper, we propose a new scheme for transcribing sung or hummed queries into a sequence of pitch and duration pairs automatically for efficient music retrieval. More specif...
Byeong-jun Han, Seungmin Rho, Eenjun Hwang
ECCV
2004
Springer
16 years 6 months ago
A Boosted Particle Filter: Multitarget Detection and Tracking
The problem of tracking a varying number of non-rigid objects has two major difficulties. First, the observation models and target distributions can be highly non-linear and non-Ga...
Kenji Okuma, Ali Taleghani, Nando de Freitas, Jame...