Sciweavers

1683 search results - page 102 / 337
» Testing system virtual machines
Sort
View
139
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
LREC
2008
126views Education» more  LREC 2008»
15 years 5 months ago
Phrase-Based Machine Translation based on Simulated Annealing
In this paper, we propose a new phrase-based translation model based on inter-lingual triggers. The originality of our method is double. First we identify common source phrases. T...
Caroline Lavecchia, David Langlois, Kamel Smaï...
ACL
2009
15 years 1 months ago
A Statistical Machine Translation Model Based on a Synthetic Synchronous Grammar
Recently, various synchronous grammars are proposed for syntax-based machine translation, e.g. synchronous context-free grammar and synchronous tree (sequence) substitution gramma...
Hongfei Jiang, Muyun Yang, Tiejun Zhao, Sheng Li, ...
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 4 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
DI
2007
81views more  DI 2007»
15 years 3 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum