Sciweavers

10435 search results - page 153 / 2087
» Measuring system normality
Sort
View
AVBPA
2005
Springer
426views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Calculation of a Composite DET Curve
Abstract. The verification performance of biometric systems is normally evaluated using the receiver operating characteristic (ROC) or detection error trade-off (DET) curve. We p...
Andy Adler, Michael E. Schuckers
ACSAC
2001
IEEE
14 years 22 days ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
DC
2007
13 years 9 months ago
The overhead of consensus failure recovery
Abstract Many reliable distributed systems are consensusbased and typically operate under two modes: a fast normal mode in failure-free synchronous periods, and a slower recovery m...
Partha Dutta, Rachid Guerraoui, Idit Keidar
ESSOS
2009
Springer
14 years 3 months ago
Report: Measuring the Attack Surfaces of Enterprise Software
Abstract. Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security ...
Pratyusa K. Manadhata, Yücel Karabulut, Jeann...
ETELEMED
2009
IEEE
154views Healthcare» more  ETELEMED 2009»
14 years 3 months ago
Continuous Noninvasive Pulse Transit Time Measurement for Psycho-physiological Stress Monitoring
—Stress is one of the most common reasons for a number of serious diseases. For the prevention and treatment of stress, a psycho-physiological monitoring system for stress measur...
Stefan Hey, Adnene Gharbi, Birte von Haaren, Katri...