Sciweavers

587 search results - page 38 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
DAMON
2006
Springer
14 years 2 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
LOPSTR
2004
Springer
14 years 3 months ago
Determinacy Analysis for Logic Programs Using Mode and Type Information
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Pedro López-García, Francisco Bueno,...
NDSS
1999
IEEE
14 years 2 months ago
PGRIP: PNNI Global Routing Infrastructure Protection
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 10 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
DCC
2005
IEEE
14 years 4 months ago
JPEG2000 and Motion JPEG2000 Content Analysis Using Codestream Length Information
The widespread adoption of the JPEG2000 standard calls for the development of computationally efficient algorithms to analyze the content of imagery compressed using this standard...
Ali Tabesh, Ali Bilgin, Karthik Krishnan, Michael ...