Sciweavers

734 search results - page 133 / 147
» Prototyping a Process Monitoring Experiment
Sort
View
CCS
2009
ACM
15 years 6 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 6 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
SRDS
2007
IEEE
15 years 6 months ago
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Code injection attacks are a top threat to today’s Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation...
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wa...
CIVR
2007
Springer
138views Image Analysis» more  CIVR 2007»
15 years 5 months ago
SemRetriev: an ontology driven image retrieval system
This paper describes the technical details of SemRetriev, a prototype system for image retrieval which combines the use of an ontology which structures an image repository and of ...
Adrian Popescu, Pierre-Alain Moëllic, Christo...
CCECE
2006
IEEE
15 years 5 months ago
A Dynamic Associative E-Learning Model based on a Spreading Activation Network
Presenting information to an e-learning environment is a challenge, mostly, because ofthe hypertextlhypermedia nature and the richness ofthe context and information provides. This...
Phongchai Nilas, Nilamit Nilas, Somsak Mitatha