Sciweavers

10435 search results - page 1786 / 2087
» Measuring system normality
Sort
View
137
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
142
Voted
CODES
2003
IEEE
15 years 10 months ago
Early estimation of the size of VHDL projects
The analysis of the amount of human resources required to complete a project is felt as a critical issue in any company of the electronics industry. In particular, early estimatin...
William Fornaciari, Fabio Salice, Daniele Paolo Sc...
CVPR
2003
IEEE
15 years 10 months ago
Continuous Tracking Within and Across Camera Streams
This paper presents a new approach for continuous tracking of moving objects observed by multiple, heterogeneous cameras. Our approach simultaneously processes video streams from ...
Jinman Kang, Isaac Cohen, Gérard G. Medioni
121
Voted
DISCEX
2003
IEEE
15 years 10 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
132
Voted
DSN
2003
IEEE
15 years 10 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
« Prev « First page 1786 / 2087 Last » Next »