Sciweavers

768 search results - page 74 / 154
» Data Movement in Kernelized Systems
Sort
View
DIMVA
2010
13 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
ICPR
2002
IEEE
14 years 2 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
CLUSTER
2008
IEEE
14 years 4 months ago
DLM: A distributed Large Memory System using remote memory swapping over cluster nodes
Abstract—Emerging 64bitOS’s supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connect...
Hiroko Midorikawa, Motoyoshi Kurokawa, Ryutaro Him...
ACL
1998
13 years 11 months ago
Growing Semantic Grammars
A critical path in the development of natural language understanding NLU modules lies in the di culty of de ning a mapping from words to semantics: Usually it takes in the order o...
Marsal Gavaldà, Alex Waibel
ICASSP
2011
IEEE
13 years 1 months ago
Estimation of cortical connectivity from E/MEG using nonlinear state-space models
We present the problem of estimating cortical connectivity between different regions of the cortex from scalp electroencephalographic (EEG) or magnetoencephalographic (MEG) data a...
Bing Leung, Patrick Cheung, Barry D. Van Veen