Sciweavers

883 search results - page 165 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
APCCM
2007
14 years 11 months ago
A Framework for Managing the Evolution of Business Protocols in Web Services
Web services are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact w...
Seung Hwan Ryu, Régis Saint-Paul, Boualem B...
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
14 years 8 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
MOBISYS
2009
ACM
15 years 10 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
EUROSYS
2007
ACM
15 years 6 months ago
Removing the memory limitations of sensor networks with flash-based virtual memory
Virtual memory has been successfully used in different domains to extend the amount of memory available to applications. We have adapted this mechanism to sensor networks, where,...
Andreas Lachenmann, Pedro José Marró...