Sciweavers

1291 search results - page 140 / 259
» Intrusion Detection for Distributed Applications
Sort
View
106
Voted
ICASSP
2009
IEEE
15 years 10 days ago
Tree configuration games for distributed stream mining systems
We consider the problem of configuring classifier trees in distributed stream mining system. The configuration involves selecting appropriate false-alarm detection tradeoffs for e...
Hyunggon Park, Deepak S. Turaga, Olivier Verscheur...
MIDDLEWARE
2007
Springer
15 years 8 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
CCR
2011
14 years 9 months ago
Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs
Proliferation and innovation of wireless technologies require significant amounts of radio spectrum. Recent policy reforms by the FCC are paving the way by freeing up spectrum fo...
Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, Hai...
CONEXT
2008
ACM
15 years 4 months ago
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and losssensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Altho...
Tongqing Qiu, Jian Ni, Hao Wang, Nan Hua, Yang Ric...
145
Voted
EUROSYS
2011
ACM
14 years 6 months ago
Finding complex concurrency bugs in large multi-threaded applications
Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, an...
Pedro Fonseca, Cheng Li, Rodrigo Rodrigues