Sciweavers

1804 search results - page 357 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EUROPAR
2000
Springer
14 years 9 days ago
Design and Evaluation of a Compiler-Directed Collective I/O Technique
Abstract. Current approaches to parallel I/O demand extensive user effort to obtain acceptable performance. This is in part due to difficulties in understanding the characteristics...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
NDQA
2003
129views Education» more  NDQA 2003»
13 years 10 months ago
Knowledge Tracking: Answering Implicit Questions
Research on Question Answering has produced an arsenal of useful techniques for detecting answers that are explicitly present in the text of a collection of documents. To move bey...
Reinhard Stolle, Daniel G. Bobrow, Cleo Condoravdi...
RAID
2010
Springer
13 years 7 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
IACR
2011
135views more  IACR 2011»
12 years 8 months ago
An Improved Internet Voting Protocol
Norway is going to experience an Internet voting scheme in September 2011 for local governmental elections, targeting a comprehensive Internet voting system in 2017 for national el...
Mehmet Sabir Kiraz, Süleyman Kardas, Muhammed...
BMCBI
2008
126views more  BMCBI 2008»
13 years 8 months ago
NITPICK: peak identification for mass spectrometry data
Background: The reliable extraction of features from mass spectra is a fundamental step in the automated analysis of proteomic mass spectrometry (MS) experiments. Results: This co...
Bernhard Y. Renard, Marc Kirchner, Hanno Steen, Ju...