Sciweavers

1804 search results - page 349 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ASPLOS
2009
ACM
14 years 9 months ago
Producing wrong data without doing anything obviously wrong!
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...
SOSP
2007
ACM
14 years 5 months ago
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications
The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications ha...
Emre Kiciman, V. Benjamin Livshits
CODES
2009
IEEE
14 years 3 months ago
FRA: a flash-aware redundancy array of flash storage devices
Since flash memory has many attractive characteristics such as high performance, non-volatility, low power consumption and shock resistance, it has been widely used as storage med...
Yangsup Lee, Sanghyuk Jung, Yong Ho Song
IJCV
2007
155views more  IJCV 2007»
13 years 8 months ago
3D Reconstruction by Shadow Carving: Theory and Practical Evaluation
Abstract. Cast shadows are an informative cue to the shape of objects. They are particularly valuable for discovering object’s concavities which are not available from other cues...
Silvio Savarese, Marco Andreetto, Holly E. Rushmei...
ISMAR
2007
IEEE
14 years 3 months ago
An Industrial Augmented Reality Solution For Discrepancy Check
Construction companies employ CAD software during the planning phase, but what is finally built often does not match the original plan. The procedure of validating the model is c...
Pierre Georgel, Pierre Schroeder, Selim Benhimane,...