Sciweavers

51 search results - page 3 / 11
» Isolating Intrusions by Automatic Experiments
Sort
View
DSN
2006
IEEE
14 years 9 days ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
ICPR
2000
IEEE
14 years 7 months ago
A Markov Random Field Model for Automatic Speech Recognition
Speech can be represented as a time/frequency distribution of energy using a multi-band filter bank. A Markov random field model, which takes into account the possible time asynch...
Gérard Chollet, Guillaume Gravier, Marc Sig...
EJASMP
2010
196views more  EJASMP 2010»
13 years 1 months ago
Optimizing Automatic Speech Recognition for Low-Proficient Non-Native Speakers
Computer Assisted Language Learning (CALL) applications for improving the oral skills of low-proficient learners have to cope with nonnative speech that is particularly challengin...
Joost van Doremalen, Catia Cucchiarini, Helmer Str...
ACSAC
2006
IEEE
14 years 10 days ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
SOSP
2009
ACM
14 years 3 months ago
Debugging in the (very) large: ten years of implementation and experience
Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has collected billion...
Kirk Glerum, Kinshuman Kinshumann, Steve Greenberg...