Sciweavers

1448 search results - page 72 / 290
» Deadlock Detection in Distributed Systems
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 2 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
PERVASIVE
2008
Springer
13 years 10 months ago
Detecting Human Movement by Differential Air Pressure Sensing in HVAC System Ductwork: An Exploration in Infrastructure Mediated
We have developed an approach for whole-house gross movement and room transition detection through sensing at only one point in the home. We consider this system to be one member o...
Shwetak N. Patel, Matthew S. Reynolds, Gregory D. ...
MOBISYS
2008
ACM
14 years 9 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 4 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
EDBTW
2010
Springer
14 years 5 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...