Sciweavers

1291 search results - page 63 / 259
» Intrusion Detection for Distributed Applications
Sort
View
100
Voted
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 19 days ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby
109
Voted
SEBD
2007
164views Database» more  SEBD 2007»
15 years 1 months ago
Online Distribution Estimation for Streaming Data: Framework and Applications
In the last few years, we have been witnessing an evergrowing need for continuous observation and monitoring applications. This need is driven by recent technological advances that...
Themis Palpanas, Vana Kalogeraki, Dimitrios Gunopu...
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
15 years 7 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...
IPPS
2002
IEEE
15 years 5 months ago
Improving the Performance of Distributed CORBA Applications
This paper proposes a new technique called CORBAas-needed to improve the performance of distributed CORBA applications. CORBA-as-needed allows distributed CORBA applications to ï¬...
Shivakant Mishra, Nija Shi
108
Voted
WORM
2003
15 years 1 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...