Sciweavers

4722 search results - page 747 / 945
» Representation-independent program analysis
Sort
View
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
BROADNETS
2006
IEEE
14 years 2 months ago
Transparent Optimization of Grid Server Selection With Real-Time Passive Network Measurements
Grid services have tremendously simplified the programming challenges in leveraging large-scale distributed comAt the same time, the increased level of abstraction reduces the op...
Marcia Zangrilli, Bruce Lowekamp
ICMCS
2006
IEEE
140views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Evolutionary Feature Generation in Speech Emotion Recognition
Feature sets are broadly discussed within speech emotion recognition by acoustic analysis. While popular filter and wrapper based search help to retrieve relevant ones, we feel th...
Björn Schuller, Stephan Reiter, Gerhard Rigol...
IPPS
2006
IEEE
14 years 2 months ago
A performance model for fine-grain accesses in UPC
UPC’s implicit communication and fine-grain programming style make application performance modeling a challenging task. The correspondence between remote references and communi...
Zhang Zhang, S. R. Seidel
IRI
2006
IEEE
14 years 2 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...