Sciweavers

617 search results - page 67 / 124
» Research Challenges for the Security of Control Systems
Sort
View
CCS
2004
ACM
14 years 2 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
IDEAS
2003
IEEE
91views Database» more  IDEAS 2003»
14 years 2 months ago
Implementation Issues of a Deterministic Transformation System for Structured Document Query Optimization
As the popularity of XML keeps growing rapidly, XML compliant structured document management becomes an interesting and compelling research area. Query optimization for structured...
Dunren Che
CODES
1999
IEEE
14 years 1 months ago
An ASIP design methodology for embedded systems
A well-known challenge during processor design is to obtain the best possible results for a typical target application domain that is generally described as a set of benchmarks. O...
Kayhan Küçükçakar
PDP
2008
IEEE
14 years 3 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...
IEEEARES
2009
IEEE
14 years 4 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop