Sciweavers

8177 search results - page 72 / 1636
» Detecting System Emulators
Sort
View
USENIX
2008
13 years 11 months ago
Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash Crowds
Unexpected surges in Web request traffic can exercise server-side resources (e.g., access bandwidth, processing, storage etc.) in undesirable ways. Administrators today do not hav...
Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Bala...
ESORICS
2008
Springer
13 years 10 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
ICASSP
2011
IEEE
13 years 21 days ago
Significance of vowel epenthesis in Telugu text-to-speech synthesis
Unit selection synthesis inventories have coverage issues, which lead to missing syllable or diphone units. In the conventional back-off strategy of substituting the missing unit ...
Vijayaditya Peddinti, Kishore Prahallad
INFSOF
2002
126views more  INFSOF 2002»
13 years 8 months ago
Detection of dynamic execution errors in IBM system automation's rule-based expert system
We formally verify aspects of the rule-based expert system of IBM's System Automation software for IBM's zSeries mainframes. Starting with a formalization of the expert ...
Carsten Sinz, Thomas Lumpp, Jürgen M. Schneid...
ACSAC
2010
IEEE
13 years 7 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna