Sciweavers

587 search results - page 58 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
14 years 3 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
SIGMOD
2004
ACM
119views Database» more  SIGMOD 2004»
14 years 10 months ago
Lazy Query Evaluation for Active XML
In this paper, we study query evaluation on Active XML documents (AXML for short), a new generation of XML documents that has recently gained popularity. AXML documents are XML do...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, I...
ICNP
2009
IEEE
13 years 8 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
HIPEAC
2005
Springer
14 years 3 months ago
Dynamic Code Region (DCR) Based Program Phase Tracking and Prediction for Dynamic Optimizations
Detecting and predicting a program’s execution phases are crucial to dynamic optimizations and dynamically adaptable systems. This paper shows that a phase can be associated with...
Jinpyo Kim, Sreekumar V. Kodakara, Wei-Chung Hsu, ...
ACL
2010
13 years 8 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...