Sciweavers

1424 search results - page 45 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
TPDS
2010
113views more  TPDS 2010»
13 years 2 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
EDBT
2008
ACM
206views Database» more  EDBT 2008»
14 years 8 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
FPLAY
2008
13 years 9 months ago
Experience in the design and development of a game based on head-tracking input
Tracking technologies, such as eye and head-tracking, provide novel techniques for interacting with video games. For instance, players can shoot with their eyes in a first person ...
Jeffrey Yim, Eric Qiu, T. C. Nicholas Graham
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 2 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
HASE
1998
IEEE
14 years 9 days ago
Incremental Development of a High Integrity Compiler: Experience from an Industrial Development
We have developed and successfully applied a technique to build a high integrity compiler from Pasp, a Pascal-like language, to Asp, the target language for a high integrity proce...
Susan Stepney