Sciweavers

264 search results - page 7 / 53
» Machine Learning in Infrastructure Security
Sort
View
CCS
2010
ACM
14 years 12 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
GCC
2009
Springer
14 years 9 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
JSW
2007
147views more  JSW 2007»
14 years 11 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
SIGMOD
2007
ACM
197views Database» more  SIGMOD 2007»
15 years 11 months ago
Automated and on-demand provisioning of virtual machines for database applications
Utility computing delivers compute and storage resources to applications as an `on-demand utility', much like electricity, from a distributed collection of computing resource...
Piyush Shivam, Azbayar Demberel, Pradeep Gunda, Da...
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
15 years 4 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...