Sciweavers

1291 search results - page 63 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 8 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby
SEBD
2007
164views Database» more  SEBD 2007»
13 years 10 months ago
Online Distribution Estimation for Streaming Data: Framework and Applications
In the last few years, we have been witnessing an evergrowing need for continuous observation and monitoring applications. This need is driven by recent technological advances that...
Themis Palpanas, Vana Kalogeraki, Dimitrios Gunopu...
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...
IPPS
2002
IEEE
14 years 1 months ago
Improving the Performance of Distributed CORBA Applications
This paper proposes a new technique called CORBAas-needed to improve the performance of distributed CORBA applications. CORBA-as-needed allows distributed CORBA applications to ï¬...
Shivakant Mishra, Nija Shi
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...