Sciweavers

1897 search results - page 276 / 380
» Early application identification
Sort
View
ACSAC
2008
IEEE
15 years 9 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICASSP
2008
IEEE
15 years 9 months ago
A detection algorithm for zero-quantized DCT coefficients in JPEG
The discrete cosine transform (DCT) is widely used in image/video coding standards. However, since most DCT coefficients will be quantized to zeros, a large number of redundant co...
Jin Li, Jarmo Takala, Moncef Gabbouj, Hexin Chen
ICC
2008
IEEE
130views Communications» more  ICC 2008»
15 years 9 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICSEA
2008
IEEE
15 years 9 months ago
Analyzing Software Evolvability of an Industrial Automation Control System: A Case Study
Evolution of software systems is characterized by inevitable changes of software and increasing software complexity, which in turn may lead to huge maintenance and development cos...
Hongyu Pei Breivold, Ivica Crnkovic, Rikard Land, ...
IEEEARES
2008
IEEE
15 years 9 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...