Sciweavers

454 search results - page 26 / 91
» Making distributed systems secure with program analysis and ...
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
An input-centric paradigm for program dynamic optimizations
Accurately predicting program behaviors (e.g., locality, dependency, method calling frequency) is fundamental for program optimizations and runtime adaptations. Despite decades of...
Kai Tian, Yunlian Jiang, Eddy Z. Zhang, Xipeng She...
NIME
2004
Springer
162views Music» more  NIME 2004»
14 years 27 days ago
The Architecture of Auracle: a Real-Time, Distributed, Collaborative Instrument
Auracle is a “group instrument,” controlled by the voice, for real-time, interactive, distributed music making over the Internet. It is implemented in the JavaTM programming l...
Chandrasekhar Ramakrishnan, Jason Freeman, Kristja...
WIOPT
2010
IEEE
13 years 5 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz
CVIU
2007
240views more  CVIU 2007»
13 years 7 months ago
Objective evaluation of approaches of skin detection using ROC analysis
Skin detection is an important indicator of human presence and actions in many domains, including interaction, interfaces and security. It is commonly performed in three steps: tr...
Stephen Schmugge, Sriram Jayaram, Min C. Shin, Leo...
IEEEARES
2006
IEEE
14 years 1 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti