Sciweavers

1273 search results - page 175 / 255
» Recovery from
Sort
View
RAID
2005
Springer
14 years 1 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
USENIX
2003
13 years 9 months ago
Undo for Operators: Building an Undoable E-mail Store
System operators play a critical role in maintaining server dependability yet lack powerful tools to help them do so. To help address this unfulfilled need, we describe Operator U...
Aaron B. Brown, David A. Patterson
DAWAK
2009
Springer
13 years 6 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
EUROGRAPHICS
2010
Eurographics
14 years 5 months ago
Synthesis of Responsive Motion Using a Dynamic Model
Synthesizing the movements of a responsive virtual character in the event of unexpected perturbations has proven a difficult challenge. To solve this problem, we devise a fully a...
Yuting Ye and C. Karen Liu
CVPR
2008
IEEE
14 years 2 months ago
A Loopy Belief Propagation approach for robust background estimation
Background estimation, i.e. automatic recovery of the background image from a sequence of images containing moving foreground objects, is an important module in many applications,...
Xun Xu, Thomas S. Huang