Sciweavers

587 search results - page 96 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 9 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
MIDDLEWARE
2010
Springer
13 years 7 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
CLUSTER
2003
IEEE
14 years 2 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
BMCBI
2011
13 years 18 days ago
Study of large and highly stratified population datasets by combining iterative pruning principal component analysis and STRUCTU
Background: The ever increasing sizes of population genetic datasets pose great challenges for population structure analysis. The Tracy-Widom (TW) statistical test is widely used ...
Tulaya Limpiti, Apichart Intarapanich, Anunchai As...
IEEEARES
2009
IEEE
14 years 3 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop