Sciweavers

1336 search results - page 111 / 268
» codes 2005
Sort
View
149
Voted
IPPS
2005
IEEE
15 years 9 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
CODES
2005
IEEE
15 years 9 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
PRDC
2005
IEEE
15 years 9 months ago
Server Protection through Dynamic Patching
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers...
Nicolas Loriant, Marc Ségura-Devillechaise,...
129
Voted
ICIP
2005
IEEE
16 years 5 months ago
Error-resilient video transmission using multiple embedded Wyner-Ziv descriptions
This paper proposes systematic lossy error protection of video waveforms using multiple embedded Wyner-Ziv video descriptions. A video signal transmitted over an error-prone chann...
Shantanu Rane, Anne Aaron, Bernd Girod
SIGSOFT
2005
ACM
16 years 4 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...