Sciweavers

144 search results - page 6 / 29
» Application-Level Isolation Using Data Inconsistency Detecti...
Sort
View
ICDCS
2003
IEEE
14 years 23 days ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
BMCBI
2007
129views more  BMCBI 2007»
13 years 7 months ago
Exploring inconsistencies in genome-wide protein function annotations: a machine learning approach
Background: Incorrectly annotated sequence data are becoming more commonplace as databases increasingly rely on automated techniques for annotation. Hence, there is an urgent need...
Carson M. Andorf, Drena Dobbs, Vasant Honavar
ACST
2006
13 years 9 months ago
A combinatorial group testing method for FPGA fault location
Adaptive fault isolation methods based on discrepancyenabled pairwise comparisons are developed for reconfigurable logic devices. By observing the discrepancy characteristics of m...
Carthik A. Sharma, Ronald F. DeMara
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 1 months ago
An effective hybrid transactional memory system with strong isolation guarantees
We propose signature-accelerated transactional memory (SigTM), a hybrid TM system that reduces the overhead of software transactions. SigTM uses hardware signatures to track the r...
Chi Cao Minh, Martin Trautmann, JaeWoong Chung, Au...
NDDL
2003
13 years 8 months ago
High-Level Data Races
Data races are a common problem in concurrent and multi-threaded programming. They are hard to detect without proper tool support. Despite the successful application of these tools...
Cyrille Artho, Klaus Havelund, Armin Biere