Sciweavers

1804 search results - page 216 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
HPCA
2005
IEEE
16 years 5 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
CHI
1994
ACM
15 years 8 months ago
Repeat and predict: two keys to efficient text editing
We propose a simple and powerful predictive interface technique for text editing tasks. With our technique called the dynamic macro creation, when a user types a special "rep...
Toshiyuki Masui, Ken Nakayama
USENIX
2007
15 years 7 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
OOPSLA
2005
Springer
15 years 10 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
VTC
2007
IEEE
101views Communications» more  VTC 2007»
15 years 11 months ago
Multi-Functional Antenna Array Assisted MC DS-CDMA Using Downlink Preprocessing Based on Singular Value Decomposition
—In this contribution we propose and investigate a transmitter preprocessing scheme designed for downlink transmission in multicarrier direct-sequence code-division multiple-acce...
Chong Xu, Bin Hu, Lie-Liang Yang, Lajos Hanzo