Sciweavers

364 search results - page 49 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
FPGA
1995
ACM
142views FPGA» more  FPGA 1995»
15 years 1 months ago
The Design of RPM: An FPGA-based Multiprocessor Emulator
Recent advances in Field-Programmable Gate Arrays (FPGA) and programmable interconnects have made it possible to build efficient hardware emulation engines. In addition, improveme...
Koray Öner, Luiz André Barroso, Sasan ...
60
Voted
CHI
2005
ACM
15 years 10 months ago
Augmented reading: presenting additional information without penalty
We present a new interaction technique for computer-based reading tasks. Our technique leverages users' peripheral vision as a channel for information transfer by using a vid...
Eric Bahna, Robert J. K. Jacob
CCS
2007
ACM
15 years 3 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
IMC
2010
ACM
14 years 7 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...