Sciweavers

1554 search results - page 143 / 311
» Testing Polymorphic Behavior
Sort
View
101
Voted
SAINT
2003
IEEE
15 years 6 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
97
Voted
FPL
2001
Springer
96views Hardware» more  FPL 2001»
15 years 5 months ago
System Level Tools for DSP in FPGAs
Abstract. Visual data ow environments are ideally suited for modeling digital signal processing (DSP) systems, as many DSP algorithms are most naturally speci ed by signal ow gra...
James Hwang, Brent Milne, Nabeel Shirazi, Jeffrey ...
94
Voted
HPDC
1999
IEEE
15 years 5 months ago
Overview of a Performance Evaluation System for Global Computing Scheduling Algorithms
While there have been several proposals of high performance global computing systems, scheduling schemes for the systems have not been well investigated. The reason is difficultie...
Atsuko Takefusa, Satoshi Matsuoka, Hidemoto Nakada...
99
Voted
ACSAC
2001
IEEE
15 years 4 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
134
Voted
IADIS
2004
15 years 2 months ago
Robo-Elc: A Robotic Adaptive Learning Appliance
This article describes a robotic adaptive learning appliance called Robo-eLC. The appliance is the result of a multidisciplinary approach which combines e-Learning and e-Commerce ...
Gaetano La Russa, Esko Marjomaa