Sciweavers

2236 search results - page 352 / 448
» Intrusion detection techniques and approaches
Sort
View
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
15 years 3 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
ICAC
2007
IEEE
15 years 1 months ago
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine
Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
Yi-Min Wang, Ming Ma
EMSOFT
2006
Springer
15 years 1 months ago
Implementing fault-tolerance in real-time systems by automatic program transformations
We present a formal approach to implement and certify fault-tolerance in real-time embedded systems. The faultintolerant initial system consists of a set of independent periodic t...
Tolga Ayav, Pascal Fradet, Alain Girault
CN
2007
104views more  CN 2007»
14 years 10 months ago
Managing feature interactions between distributed SIP call control services
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
Mario Kolberg, Evan H. Magill
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
14 years 8 months ago
Categorizing object-action relations from semantic scene graphs
— In this work we introduce a novel approach for detecting spatiotemporal object-action relations, leading to both, action recognition and object categorization. Semantic scene g...
Eren Erdal Aksoy, Alexey Abramov, Florentin Wö...