Sciweavers

816 search results - page 126 / 164
» Performance Analysis Of A WWW Server
Sort
View
CCS
2007
ACM
15 years 8 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
ICISS
2007
Springer
15 years 8 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
15 years 7 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
ICEIS
2003
IEEE
15 years 7 months ago
Widam - Web Interaction Display and Monitoring
: In this paper we describe the design and implementation of a system called Web Interaction Display and Monitoring (WIDAM). We have developed a web based client-server application...
Hugo Gamboa, Vasco Ferreira
111
Voted
ICNP
2003
IEEE
15 years 7 months ago
On the Cost-Quality Tradeoff in Topology-Aware Overlay Path Probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢¤£¦¥¨§© , which is prohibitive i...
Chiping Tang, Philip K. McKinley