Sciweavers

935 search results - page 128 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
CBMS
2003
IEEE
14 years 3 months ago
A National Virtual Specimen Database for Early Cancer Detection
Access to biospecimens is essential for enabling cancer biomarker discovery. The National Cancer Institute's (NCI) Early Detection Research Network (EDRN) comprises and integ...
Heather Kincaid, Sean C. Kelly, Daniel J. Crichton...
ACSC
2006
IEEE
14 years 4 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ASWSD
2004
Springer
14 years 3 months ago
On the Fault Hypothesis for a Safety-Critical Real-Time System
– A safety-critical real-time computer system must provide its services with a dependability that is much better than the dependability of any one of its constituent components. ...
Hermann Kopetz
USENIX
1994
13 years 11 months ago
Resolving File Conflicts in the Ficus File System
Ficus is a flexible replication facility with optimistic concurrency control designed to span a wide range of scales and network environments. Optimistic concurrency control provi...
Peter L. Reiher, John S. Heidemann, David Ratner, ...
DSN
2000
IEEE
14 years 2 months ago
Exploiting Non-Determinism for Reliability of Mobile Agent Systems
An important technical hurdle blocking the adoption of mobile agent technology is the lack of reliability. Designing a reliable mobile agent system is especially challenging since...
Ajay Mohindra, Apratim Purakayastha, Prasannaa Tha...