Sciweavers

1804 search results - page 234 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
81
Voted
ICRA
2010
IEEE
181views Robotics» more  ICRA 2010»
14 years 8 months ago
An Electric Field Pretouch system for grasping and co-manipulation
— Pretouch sensing is longer range than contact, but shorter range than vision. The hypothesis motivating this work is that closed loop feedback based on short range but nonconta...
Brian Mayton, Louis LeGrand, Joshua R. Smith
ECOWS
2007
Springer
15 years 4 months ago
Specifying and Monitoring Composite Events for Semantic Web Services
Execution monitoring of complex web service process models is critical for effective management and control of web services based systems. During the composite process model execu...
Roman Vaculín, Katia P. Sycara
101
Voted
RAID
2010
Springer
14 years 8 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis
115
Voted
HVC
2005
Springer
183views Hardware» more  HVC 2005»
15 years 3 months ago
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
Concurrent programs are notorious for containing errors that are difficult to reproduce and diagnose. A common kind of concurrency error is deadlock, which occurs when a set of thr...
Rahul Agarwal, Liqiang Wang, Scott D. Stoller
BMCBI
2007
93views more  BMCBI 2007»
14 years 10 months ago
SVM-Fold: a tool for discriminative multi-class protein fold and superfamily recognition
Background: Predicting a protein’s structural class from its amino acid sequence is a fundamental problem in computational biology. Much recent work has focused on developing ne...
Iain Melvin, Eugene Ie, Rui Kuang, Jason Weston, W...