Sciweavers

314 search results - page 26 / 63
» An Evaluation of the Effectiveness of Measurement-based Anom...
Sort
View
ISLPED
2004
ACM
122views Hardware» more  ISLPED 2004»
14 years 1 months ago
Microarchitectural techniques for power gating of execution units
Leakage power is a major concern in current and future microprocessor designs. In this paper, we explore the potential of architectural techniques to reduce leakage through power-...
Zhigang Hu, Alper Buyuktosunoglu, Viji Srinivasan,...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 27 days ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
IMC
2006
ACM
14 years 1 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
ESORICS
2009
Springer
13 years 11 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
CNSM
2010
13 years 2 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...