Sciweavers

1008 search results - page 145 / 202
» Multiobjective process controllability analysis
Sort
View
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 3 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
ICCCN
2007
IEEE
14 years 3 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li
RAID
2007
Springer
14 years 3 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
METRICS
2005
IEEE
14 years 2 months ago
Acceptance Issues in Metrics Program Implementation
Software process improvement initiatives such as metrics programs have a high failure rate during their assimilation in a software organization. Social and individual issues are s...
Medha Umarji, Henry Emurian
GECCO
2005
Springer
151views Optimization» more  GECCO 2005»
14 years 2 months ago
The application of antigenic search techniques to time series forecasting
Time series have been a major topic of interest and analysis for hundreds of years, with forecasting a central problem. A large body of analysis techniques has been developed, par...
Ian Nunn, Tony White