Sciweavers

1424 search results - page 93 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
KDD
2005
ACM
205views Data Mining» more  KDD 2005»
14 years 1 months ago
Feature bagging for outlier detection
Outlier detection has recently become an important problem in many industrial and financial applications. In this paper, a novel feature bagging approach for detecting outliers in...
Aleksandar Lazarevic, Vipin Kumar
ACSAC
2001
IEEE
13 years 12 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
CASES
2003
ACM
13 years 12 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
ICCS
2004
Springer
14 years 1 months ago
Data Driven Design Optimization Methodology Development and Application
The Data Driven Design Optimization Methodology (DDDOM) is a Dynamic Data Driven Application System (DDDAS) developed for engineering design optimization. The DDDOM synergizes expe...
H. Zhao, D. Knight, E. Taskinoglu, V. Jovanovic
CDES
2006
101views Hardware» more  CDES 2006»
13 years 9 months ago
Hybrid Error-Detection Approach with No Detection Latency for High-Performance Microprocessors
- Error detection plays an important role in fault-tolerant computer systems. Two primary parameters concerned for error detection are the latency and coverage. In this paper, a ne...
Yung-Yuan Chen, Kuen-Long Leu, Li-Wen Lin