Sciweavers

2236 search results - page 333 / 448
» Intrusion detection techniques and approaches
Sort
View
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 7 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
ESORICS
2010
Springer
13 years 7 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
ICST
2009
IEEE
13 years 7 months ago
Test Redundancy Measurement Based on Coverage Information: Evaluations and Lessons Learned
Measurement and detection of redundancy in test suites attempt to achieve test minimization which in turn can help reduce test maintenance costs, and to also ensure the integrity ...
Negar Koochakzadeh, Vahid Garousi, Frank Maurer
JBCS
2010
85views more  JBCS 2010»
13 years 4 months ago
OWL schema matching
Schema matching is a fundamental issue to many database applications, such as query mediation and data warehousing. It becomes a challenge when different vocabularies are used to r...
Luiz André P. Paes Leme, Marco A. Casanova,...
CSMR
2011
IEEE
13 years 1 months ago
Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software
Abstract—Developers introduce novel and undocumented micro-architectures when performing evolution tasks on object-oriented applications. We are interested in understanding wheth...
Ahmed Belderrar, Segla Kpodjedo, Yann-Gaël Gu...