Sciweavers

2236 search results - page 76 / 448
» Intrusion detection techniques and approaches
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
CRV
2007
IEEE
159views Robotics» more  CRV 2007»
15 years 4 months ago
Automatic Detection and Clustering of Actor Faces based on Spectral Clustering Techniques
We describe a video indexing system that aims at indexing large video files in relation to the presence of similar faces. The detection of near-frontal view faces is done with a c...
Samuel Foucher, Langis Gagnon
COMSNETS
2012
199views more  COMSNETS 2012»
13 years 5 months ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...
HPCA
2006
IEEE
15 years 10 months ago
Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors
With reducing feature size, increasing chip capacity, and increasing clock speed, microprocessors are becoming increasingly susceptible to transient (soft) errors. Redundant multi...
Sumeet Kumar, Aneesh Aggarwal
DATE
2000
IEEE
90views Hardware» more  DATE 2000»
15 years 2 months ago
Cost Reduction and Evaluation of a Temporary Faults Detecting Technique
: IC technologies are approaching the ultimate limits of silicon in terms of channel width, power supply and speed. By approaching these limits, circuits are becoming increasingly ...
Lorena Anghel, Michael Nicolaidis