Sciweavers

7629 search results - page 1384 / 1526
» On the Performance of a Survivability Architecture for Netwo...
Sort
View
CSI
2011
389views Social Sciences» more  CSI 2011»
13 years 2 months ago
Acceleration of acoustic emission signal processing algorithms using CUDA standard
Offline processing of acoustic emission (AE) signal waveforms recorded during a long-term AE monitoring session is a challenging problem in AE testing area. This is due to the fac...
Lubomir Riha, Radislav Smid
DAC
2008
ACM
14 years 9 months ago
Multithreaded simulation for synchronous dataflow graphs
Synchronous dataflow (SDF) has been successfully used in design tools for system-level simulation of wireless communication systems. Modern wireless communication standards involv...
Chia-Jui Hsu, José Luis Pino, Shuvra S. Bha...
PET
2010
Springer
13 years 12 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 2 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
« Prev « First page 1384 / 1526 Last » Next »