Sciweavers

935 search results - page 74 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
CIT
2004
Springer
14 years 2 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
DICTA
2007
13 years 10 months ago
Real-Time Face Detection and Tracking for High Resolution Smart Camera System
Smart Cameras are becoming more popular in Intelligent Surveillance Systems area. Recognizing faces in a crowd in real-time is a key features which would significantly enhance Int...
Yasir Mohd-Mustafah, Ting Shan, Amelia W. Azman, A...
CDES
2006
101views Hardware» more  CDES 2006»
13 years 10 months ago
Hybrid Error-Detection Approach with No Detection Latency for High-Performance Microprocessors
- Error detection plays an important role in fault-tolerant computer systems. Two primary parameters concerned for error detection are the latency and coverage. In this paper, a ne...
Yung-Yuan Chen, Kuen-Long Leu, Li-Wen Lin
ICDCSW
2005
IEEE
14 years 2 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
WACC
1999
ACM
14 years 1 months ago
SaveMe: a system for archiving electronic documents using messaging groupware
Today, organizations deal with an ever-increasing number of documents that have to be archived because they are either related to their core business (e.g., product designs) or ne...
Stefan Berchtold, Alexandros Biliris, Euthimios Pa...