Sciweavers

587 search results - page 41 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
13 years 1 months ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding
CCS
2005
ACM
14 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
IEEEIAS
2008
IEEE
14 years 4 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
DAGM
2006
Springer
14 years 9 days ago
Detecting Intrinsically Two-Dimensional Image Structures Using Local Phase
Abstract. This paper presents a novel approach towards detecting intrinsically two-dimensional (i2D) image structures using local phase information. The local phase of the i2D stru...
Di Zang, Gerald Sommer
EMNLP
2006
13 years 11 months ago
Detecting Parser Errors Using Web-based Semantic Filters
NLP systems for tasks such as question answering and information extraction typically rely on statistical parsers. But the efficacy of such parsers can be surprisingly low, partic...
Alexander Yates, Stefan Schoenmackers, Oren Etzion...