Sciweavers

1804 search results - page 268 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
MIDDLEWARE
2010
Springer
14 years 8 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
ICPADS
2005
IEEE
15 years 3 months ago
Distributed Integrity Checking for Systems with Replicated Data
This work presents a new comparison-based diagnosis model and a new algorithm, called Hi-Dif, based on this model. The algorithm is used for checking the integrity of systems with...
Roverli Pereira Ziwich, Elias Procópio Duar...
AGENTS
2000
Springer
15 years 2 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
ACHI
2008
IEEE
15 years 1 days ago
Specification for User Modeling with Self-Observing Systems
The complicated user interfaces and complex functionality of nowadays interactive products lead to a new class of failures: People do not understand their products and thus fail t...
Mathias Funk, Piet van der Putten, Henk Corporaal
DAGM
2003
Springer
15 years 3 months ago
Real-Time Inspection System for Printed Circuit Boards
In this paper, we present a real-time PCB inspection system which can detect defects including the breaks in the wires and short circuit. The proposed inspection algorithm is based...
Kang-Sun Choi, Jae-Young Pyun, Nam-Hyeong Kim, Bye...