Sciweavers

862 search results - page 169 / 173
» BISON: Providing Business Information Analysis as a Service
Sort
View
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
AINA
2007
IEEE
14 years 1 months ago
Multi-Stage Real Time Health Monitoring via ZigBee in Smart Homes
We present a framework for a wireless health monitoring system within a smart home using ZigBee technology. Vital signals are collected and processed using a 3-tiered architecture...
S. Dagtas, G. Pekhteryev, Zafer Sahinoglu
SC
2009
ACM
14 years 8 days ago
Web 2.0-based social informatics data grid
The Social Informatics Data Grid (SIDGrid) is a new cyberinfrastructure designed to transform how social and behavioral scientists collect and annotate data, collaborate and share...
Wenjun Wu, Thomas D. Uram, Michael E. Papka
INFOCOM
2002
IEEE
14 years 16 days ago
Self-Verifying CSFQ
— Recently, a class of solutions including Core-Stateless Fair Queueing (CSFQ), Rainbow Fair Queueing, and Diffserv have been proposed to address the scalability concerns that ha...
Ion Stoica, Hui Zhang, Scott Shenker
RAID
1999
Springer
13 years 12 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li