Sciweavers

1804 search results - page 265 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EMSOFT
2007
Springer
14 years 3 months ago
Block recycling schemes and their cost-based optimization in nand flash memory based storage system
Flash memory has many merits such as light weight, shock resistance, and low power consumption, but also has limitations like the erase-before-write property. To overcome such lim...
Jongmin Lee, Sunghoon Kim, Hunki Kwon, Choulseung ...
WWW
2005
ACM
14 years 9 months ago
A personalized search engine based on web-snippet hierarchical clustering
In this paper we propose a hierarchical clustering engine, called SnakeT, that is able to organize on-the-fly the search results drawn from 16 commodity search engines into a hier...
Paolo Ferragina, Antonio Gulli
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining for misconfigured machines in grid systems
Grid systems are proving increasingly useful for managing the batch computing jobs of organizations. One well known example for that is Intel which uses an internally developed sy...
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ra...
IJRR
2010
135views more  IJRR 2010»
13 years 6 months ago
On the Design and Use of a Micro Air Vehicle to Track and Avoid Adversaries
The MAV '08 competition focused on the problem of using air and ground vehicles to locate and rescue hostages being held in a remote building. To execute this mission, a numbe...
Ruijie He, Abraham Bachrach, Michael Achtelik, Alb...
SPIN
2010
Springer
13 years 7 months ago
Automatic Generation of Model Checking Scripts Based on Environment Modeling
When applying model checking to the design models of the embedded systems, it is necessary to model not only the behavior of the target system but also that of the environment inte...
Kenro Yatake, Toshiaki Aoki