Sciweavers

164 search results - page 17 / 33
» Selecting and Improving System Call Models for Anomaly Detec...
Sort
View
ISCA
2007
IEEE
113views Hardware» more  ISCA 2007»
15 years 3 months ago
Thermal modeling and management of DRAM memory systems
With increasing speed and power density, high-performance memories, including FB-DIMM (Fully Buffered DIMM) and DDR2 DRAM, now begin to require dynamic thermal management (DTM) a...
Jiang Lin, Hongzhong Zheng, Zhichun Zhu, Howard Da...
83
Voted
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 9 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CVPR
2008
IEEE
15 years 11 months ago
A discriminatively trained, multiscale, deformable part model
This paper describes a discriminatively trained, multiscale, deformable part model for object detection. Our system achieves a two-fold improvement in average precision over the b...
Pedro F. Felzenszwalb, David A. McAllester, Deva R...
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
15 years 9 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden
CN
2007
91views more  CN 2007»
14 years 9 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke