Sciweavers

1804 search results - page 282 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Finding errors in components that exchange xml data
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Using Application Programming Interface (API) calls exported b...
Mark Grechanik
CCS
2003
ACM
14 years 2 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
DIMEA
2008
138views Multimedia» more  DIMEA 2008»
13 years 10 months ago
Motion2Sound
Motion2Sound is a program that translates motion properties into sound ones. This is done by using a motion detection system(Open Cv) and one can have as an input a live web-cam o...
Aggelos Bousbouras, Antanas Kazilunas
ISCA
2002
IEEE
115views Hardware» more  ISCA 2002»
14 years 1 months ago
SafetyNet: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery
We develop an availability solution, called SafetyNet, that uses a unified, lightweight checkpoint/recovery mechanism to support multiple long-latency fault detection schemes. At...
Daniel J. Sorin, Milo M. K. Martin, Mark D. Hill, ...
ICIP
2004
IEEE
14 years 10 months ago
Action segmentation and recognition in meeting room scenarios
In this proposal a novel implementation to find and recognize person actions in image sequences of meeting scenarios is introduced. Such extracted information can be used as the b...
Frank Wallhoff, Martin Zobl, Gerhard Rigoll