Sciweavers

407 search results - page 72 / 82
» A Framework for the Evaluation of Intrusion Detection System...
Sort
View
CCGRID
2008
IEEE
14 years 1 months ago
Application Resilience: Making Progress in Spite of Failure
Abstract—While measures such as raw compute performance and system capacity continue to be important factors for evaluating cluster performance, such issues as system reliability...
William M. Jones, John T. Daly, Nathan DeBardelebe...
INFOSCALE
2006
ACM
14 years 1 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
ICMI
2005
Springer
201views Biometrics» more  ICMI 2005»
14 years 27 days ago
A joint particle filter for audio-visual speaker tracking
In this paper, we present a novel approach for tracking a lecturer during the course of his speech. We use features from multiple cameras and microphones, and process them in a jo...
Kai Nickel, Tobias Gehrig, Rainer Stiefelhagen, Jo...
ICSE
1998
IEEE-ACM
13 years 11 months ago
An Approach to Large-Scale Collection of Application Usage Data Over the Internet
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
David M. Hilbert, David F. Redmiles
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 7 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi