Sciweavers

164 search results - page 20 / 33
» Selecting and Improving System Call Models for Anomaly Detec...
Sort
View
IPPS
2010
IEEE
14 years 7 months ago
Hardware implementation for scalable lookahead Regular Expression detection
Regular Expressions (RegExes) are widely used in various applications to identify strings of text. Their flexibility, however, increases the complexity of the detection system and ...
Masanori Bando, N. Sertac Artan, Nishit Mehta, Yi ...
PTS
2007
81views Hardware» more  PTS 2007»
14 years 11 months ago
An EFSM-Based Passive Fault Detection Approach
Extended Finite State Machine (EFSM)-based passive fault detection involves modeling the system under test (SUT) as an EFSM M, monitoring the input/output behaviors of the SUT, and...
Hasan Ural, Zhi Xu
VLDB
1994
ACM
121views Database» more  VLDB 1994»
15 years 1 months ago
The Impact of Global Clustering on Spatial Database Systems
Global clustering has rarely been investigated in the area of spatial database systems although dramatic performance improvements can be achieved by using suitable techniques. In ...
Thomas Brinkhoff, Hans-Peter Kriegel
ECAI
2006
Springer
15 years 1 months ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 1 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...