Sciweavers

8177 search results - page 117 / 1636
» Detecting System Emulators
Sort
View
WETICE
2002
IEEE
14 years 3 months ago
A Mobile Agent Clone Detection System with Itinerary Privacy
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
T. C. Lam, Victor K. Wei
HPCC
2009
Springer
14 years 2 months ago
A Streaming Intrusion Detection System for Grid Computing Environments
Abstract—In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented. Detection mechanisms based on traditional lo...
Matthew Smith, Fabian Schwarzer, Marian Harbach, T...
SAC
2008
ACM
13 years 9 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
ICAT
2007
IEEE
14 years 4 months ago
Construction of Virtual Assembly System with Real-Time Collision Detection
In the design of a large-scale device, it is very important to confirm that there is no interference or spatial conflict among the parts. Virtual reality devices have been used ...
Yuichi Tamura, Naoki Mizuguchi, Soju Matsumoto, He...
AIPR
2003
IEEE
14 years 3 months ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen