Sciweavers

141 search results - page 11 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
SGAI
2004
Springer
14 years 1 months ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
ICIP
2009
IEEE
13 years 5 months ago
Overview of adaptive morphology: Trends and perspectives
In this paper we briefly overview emerging trends in `Adaptive Morphology', i.e. work related to the theory and/or applications of image analysis filters, systems, or algorit...
Petros Maragos, Corinne Vachier
JSAC
2011
184views more  JSAC 2011»
13 years 2 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 9 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang