Sciweavers

1804 search results - page 275 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
COMCOM
2008
100views more  COMCOM 2008»
13 years 9 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib
SOFTVIS
2005
ACM
14 years 2 months ago
Exploiting UML dynamic object modeling for the visualization of C++ programs
In this paper we present an approach to modeling and visualizing the dynamic interactions among objects in a C++ application. We exploit UML diagrams to expressively visualize bot...
Brian A. Malloy, James F. Power
IGPL
2000
103views more  IGPL 2000»
13 years 8 months ago
General Patterns for Nonmonotonic Reasoning: From Basic Entailments to Plausible Relations
This paper has two goals. First, we develop frameworks for logical systems which are able to re ect not only nonmonotonic patterns of reasoning, but also paraconsistent reasoning....
Ofer Arieli, Arnon Avron
ASPLOS
2006
ACM
14 years 2 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 2 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...