Sciweavers

1804 search results - page 268 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
MIDDLEWARE
2010
Springer
13 years 7 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
ICPADS
2005
IEEE
14 years 2 months ago
Distributed Integrity Checking for Systems with Replicated Data
This work presents a new comparison-based diagnosis model and a new algorithm, called Hi-Dif, based on this model. The algorithm is used for checking the integrity of systems with...
Roverli Pereira Ziwich, Elias Procópio Duar...
AGENTS
2000
Springer
14 years 1 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
ACHI
2008
IEEE
13 years 11 months ago
Specification for User Modeling with Self-Observing Systems
The complicated user interfaces and complex functionality of nowadays interactive products lead to a new class of failures: People do not understand their products and thus fail t...
Mathias Funk, Piet van der Putten, Henk Corporaal
DAGM
2003
Springer
14 years 2 months ago
Real-Time Inspection System for Printed Circuit Boards
In this paper, we present a real-time PCB inspection system which can detect defects including the breaks in the wires and short circuit. The proposed inspection algorithm is based...
Kang-Sun Choi, Jae-Young Pyun, Nam-Hyeong Kim, Bye...