Sciweavers

2945 search results - page 538 / 589
» Noisy Network Coding
Sort
View
RAID
2005
Springer
15 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
BIRTHDAY
2004
Springer
15 years 3 months ago
Communicating Mobile Processes
This paper presents a new model for mobile processes in occam-π. A process, embedded anywhere in a dynamically evolving network, may suspend itself mid-execution, be safely discon...
Peter H. Welch, Fred R. M. Barnes
EUC
2004
Springer
15 years 3 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
ICBA
2004
Springer
197views Biometrics» more  ICBA 2004»
15 years 3 months ago
Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems
We apply the ETSI’s DSR standard to speaker verification over telephone networks and investigate the effect of extracting spectral features from different stages of the ETSI...
Chin-Hung Sit, Man-Wai Mak, Sun-Yuan Kung