Sciweavers

861 search results - page 41 / 173
» Internal implementation
Sort
View
ACSAC
2005
IEEE
15 years 8 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
134
Voted
SIGMOD
2012
ACM
191views Database» more  SIGMOD 2012»
13 years 4 months ago
Sindbad: a location-based social networking system
This demo presents Sindbad; a location-based social networking system. Sindbad supports three new services beyond traditional social networking services, namely, location-aware ne...
Mohamed Sarwat, Jie Bao 0003, Ahmed Eldawy, Justin...
111
Voted
OSDI
2004
ACM
16 years 2 months ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...
IASTEDSE
2004
15 years 3 months ago
Mapping UML statecharts to java code
The Unified Modeling Language (UML) statechart diagram is used for modeling the dynamic aspects of systems. The UML statechart diagrams include many concepts that are not present ...
Iftikhar Azim Niaz, Jiro Tanaka
124
Voted
CVPR
2003
IEEE
16 years 4 months ago
Expectation Grammars: Leveraging High-Level Expectations for Activity Recognition
Video-based recognition and prediction of a temporally extended activity can benefit from a detailed description of high-level expectations about the activity. Stochastic grammars...
David Minnen, Irfan A. Essa, Thad Starner