Sciweavers

210 search results - page 30 / 42
» 20 Years of Operating Systems Security
Sort
View
AAAI
2006
13 years 8 months ago
Predicting Electricity Distribution Feeder Failures Using Machine Learning Susceptibility Analysis
A Machine Learning (ML) System known as ROAMS (Ranker for Open-Auto Maintenance Scheduling) was developed to create failure-susceptibility rankings for almost one thousand 13.8kV-...
Philip Gross, Albert Boulanger, Marta Arias, David...
CSCW
2004
ACM
14 years 4 days ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
PDP
2008
IEEE
14 years 1 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 10 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...