Sciweavers

1090 search results - page 123 / 218
» A Replicated Monitoring Tool
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 11 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
CAV
2008
Springer
157views Hardware» more  CAV 2008»
13 years 11 months ago
Effective Program Verification for Relaxed Memory Models
Program verification for relaxed memory models is hard. The high degree of nondeterminism in such models challenges standard verification techniques. This paper proposes a new veri...
Sebastian Burckhardt, Madanlal Musuvathi
CIKM
2008
Springer
13 years 11 months ago
Mirroring your web presence
This paper describes the starting points of how to design and build tools to help individual users track and monitor their presence on the web from the standpoints of individual p...
Markus Bylund, Jussi Karlgren, Fredrik Olsson, Ped...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
SDM
2010
SIAM
195views Data Mining» more  SDM 2010»
13 years 10 months ago
MACH: Fast Randomized Tensor Decompositions
Tensors naturally model many real world processes which generate multi-aspect data. Such processes appear in many different research disciplines, e.g, chemometrics, computer visio...
Charalampos E. Tsourakakis