Sciweavers

2236 search results - page 352 / 448
» Intrusion detection techniques and approaches
Sort
View
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
14 years 2 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
ICAC
2007
IEEE
14 years 1 months ago
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine
Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
Yi-Min Wang, Ming Ma
EMSOFT
2006
Springer
14 years 26 days ago
Implementing fault-tolerance in real-time systems by automatic program transformations
We present a formal approach to implement and certify fault-tolerance in real-time embedded systems. The faultintolerant initial system consists of a set of independent periodic t...
Tolga Ayav, Pascal Fradet, Alain Girault
CN
2007
104views more  CN 2007»
13 years 9 months ago
Managing feature interactions between distributed SIP call control services
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
Mario Kolberg, Evan H. Magill
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
13 years 7 months ago
Categorizing object-action relations from semantic scene graphs
— In this work we introduce a novel approach for detecting spatiotemporal object-action relations, leading to both, action recognition and object categorization. Semantic scene g...
Eren Erdal Aksoy, Alexey Abramov, Florentin Wö...