Sciweavers

2236 search results - page 311 / 448
» Intrusion detection techniques and approaches
Sort
View
COMPSAC
2009
IEEE
14 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
ICASSP
2008
IEEE
14 years 3 months ago
Rhythmic similarity of music based on dynamic periodicity warping
This paper introduces a new way to measure rhythmic similarity between two musical pieces using periodicity spectra. In order to detect similarity for pieces of different tempi, t...
Andre Holzapfel, Yannis Stylianou
ACSC
2007
IEEE
14 years 3 months ago
Jooj: Real-Time Support For Avoiding Cyclic Dependencies
The design guideline avoid dependency cycles among modules was first alluded to by Parnas in 1978. Many tools have since been built to detect cyclic dependencies among a program...
Hayden Melton, Ewan D. Tempero
CGO
2007
IEEE
14 years 3 months ago
SuperPin: Parallelizing Dynamic Instrumentation for Real-Time Performance
Dynamic instrumentation systems have proven to be extremely valuable for program introspection, architectural simulation, and bug detection. Yet a major drawback of modern instrum...
Steven Wallace, Kim M. Hazelwood
EDOC
2007
IEEE
14 years 3 months ago
An Enterprise Architecture Alignment Measure for Telecom Service Development
The increasing complexity of modern Information Services (IS) makes necessary to carry on review activities. For many companies, these reviews take place within the framework of t...
Jacques Simonin, Yves Le Traon, Jean-Marc Jé...