Sciweavers

1538 search results - page 234 / 308
» Programming with Patterns
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
IDEAL
2010
Springer
13 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
IPPS
2006
IEEE
14 years 4 months ago
Speeding up NGB with distributed file streaming framework
Grid computing provides a very rich environment for scientific calculations. In addition to the challenges it provides, it also offers new opportunities for optimization. In this ...
Bingchen Li, Kang Chen, Zhiteng Huang, H. L. Rajic...
IPPS
2003
IEEE
14 years 3 months ago
SPMD Image Processing on Beowulf Clusters: Directives and Libraries
Most image processing algorithms can be parallelized by splitting parallel loops and by using very few communication patterns. Code parallelization using MPI still involves much p...
Paulo F. Oliveira, J. M. Hans du Buf
ACMSE
2004
ACM
14 years 3 months ago
E-R modeler: a database modeling toolkit for Eclipse
Eclipse is a Java integrated development environment (IDE) and tool integration platform that offers numerous extension points for customization through a plug-in architecture. Th...
Song Zhou, Chuanxi Xu, Hui Wu, Jing Zhang, Yuehua ...