Sciweavers

883 search results - page 53 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
ICPR
2008
IEEE
14 years 5 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
EUC
2004
Springer
14 years 4 months ago
Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation
The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required for distributed application. From the DOGF, we manage dis...
Chang-Sun Shin, Chang-Won Jeong, Su-Chong Joo
ICDCS
2003
IEEE
14 years 4 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
ICBA
2004
Springer
197views Biometrics» more  ICBA 2004»
14 years 4 months ago
Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems
We apply the ETSI’s DSR standard to speaker verification over telephone networks and investigate the effect of extracting spectral features from different stages of the ETSI...
Chin-Hung Sit, Man-Wai Mak, Sun-Yuan Kung
CCGRID
2010
IEEE
13 years 12 months ago
The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems
With the increasing functionality and complexity of distributed systems, resource failures are inevitable. While numerous models and algorithms for dealing with failures exist, th...
Derrick Kondo, Bahman Javadi, Alexandru Iosup, Dic...