Sciweavers

3451 search results - page 581 / 691
» Collaborative attack modeling
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
ANSS
2003
IEEE
14 years 1 months ago
Dissemination Scenarios in Peer-to-Peer Networks
As the average bandwidth capacity is increasing, users around the world demand for shorter service time. While the servers are able to acquire more bandwidth, they can not keep up...
Konstantinos G. Zerfiridis, Helen D. Karatza
APCSAC
2003
IEEE
14 years 1 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
MICRO
2003
IEEE
96views Hardware» more  MICRO 2003»
14 years 1 months ago
Using Interaction Costs for Microarchitectural Bottleneck Analysis
Attacking bottlenecks in modern processors is difficult because many microarchitectural events overlap with each other. This parallelism makes it difficult to both (a) assign a ...
Brian A. Fields, Rastislav Bodík, Mark D. H...
ISMIR
2003
Springer
161views Music» more  ISMIR 2003»
14 years 1 months ago
Improving polyphonic and poly-instrumental music to score alignment
Music alignment links events in a score and points on the audio performance time axis. All the parts of a recording can be thus indexed according to score information. The automat...
Ferréol Soulez, Xavier Rodet, Diemo Schwarz