Sciweavers

6514 search results - page 879 / 1303
» Low-Knowledge Algorithm Control
Sort
View
142
Voted
RAID
2000
Springer
15 years 7 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
EURODAC
1995
IEEE
202views VHDL» more  EURODAC 1995»
15 years 7 months ago
Hardware-software co-synthesis of fault-tolerant real-time distributed embedded systems
Distributed systems are becoming a popular way of implementing many embedded computing applications, automotive control being a common and important example. Such embedded systems...
Santhanam Srinivasan, Niraj K. Jha
INFOCOM
1995
IEEE
15 years 7 months ago
Complexity of Gradient Projection Method for Optimal Routing in Data Networks
—In this paper, we derive a time-complexity bound for the gradient projection method for optimal routing in data networks. This result shows that the gradient projection algorith...
Wei Kang Tsai, John K. Antonio, Garng M. Huang
MM
1995
ACM
100views Multimedia» more  MM 1995»
15 years 7 months ago
Fast Lossy Internet Image Transmission
Images are usually transmitted across the Internet using a lossless protocol such as TCP/IP. Lossless protocols require retransmission of lost packets, which substantially increas...
John M. Danskin, Geoffrey M. Davis, Xiyong Song
VLDB
1995
ACM
87views Database» more  VLDB 1995»
15 years 7 months ago
Redo Recovery after System Crashes
: This paper defines a framework for explaining redo recovery after a system crash. In this framework, an installation graph explains the order in which operations must be install...
David B. Lomet, Mark R. Tuttle