Sciweavers

1804 search results - page 240 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
MICRO
2007
IEEE
159views Hardware» more  MICRO 2007»
15 years 4 months ago
Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation
As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
15 years 7 months ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
GD
2008
Springer
14 years 11 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
93
Voted
SPIESR
1998
190views Database» more  SPIESR 1998»
14 years 11 months ago
NeTra-V: Toward an Object-Based Video Representation
We present here a prototype video analysis and retrieval system, called NeTra-V, that is being developed to build an object-based video representation for functionalities such as s...
Yining Deng, Debargha Mukherjee, B. S. Manjunath
96
Voted
ICPR
2004
IEEE
15 years 11 months ago
Object-Based Video Coding Using Pixel State Analysis
In archiving video for surveillance, frame-based coding has been used and it makes storage size large because the whole image is stored even if there is no object in the image. On...
Hironobu Fujiyoshi, Takayuki Nishi