Sciweavers

1804 search results - page 333 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
HUC
2004
Springer
14 years 2 months ago
MouseField: A Simple and Versatile Input Device for Ubiquitous Computing
Although various interaction technologies for handling information in the ubiquitous computing environment have been proposed, some techniques are too simple for performing rich in...
Toshiyuki Masui, Koji Tsukada, Itiro Siio
ICES
2005
Springer
176views Hardware» more  ICES 2005»
14 years 2 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
ACCV
2006
Springer
14 years 16 days ago
Complex Activity Representation and Recognition by Extended Stochastic Grammar
Stochastic grammar has been used in many video analysis and event recognition applications as an efficient model to represent large-scale video activity. However, in previous works...
Zhang Zhang, Kaiqi Huang, Tieniu Tan
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 3 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
IPSN
2007
Springer
14 years 2 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava