Sciweavers

935 search results - page 114 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ASWEC
2005
IEEE
14 years 3 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
MOBISYS
2008
ACM
14 years 9 months ago
Brimon: a sensor network system for railway bridge monitoring
: Railway systems are critical in many regions, and can consist of several tens of thousands of bridges, being used over several decades. It is critical to have a system to monitor...
Kameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra...
DEBU
2008
125views more  DEBU 2008»
13 years 10 months ago
Querying XML in Timber
In this paper, we describe the TIMBER XML database system implemented at University of Michigan. TIMBER was one of the first native XML database systems, designed from the ground ...
Yuqing Wu, Stelios Paparizos, H. V. Jagadish
CCGRID
2005
IEEE
14 years 3 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
ACSAC
2008
IEEE
14 years 4 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode