Sciweavers

3667 search results - page 575 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
OTM
2007
Springer
14 years 3 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
SACRYPT
2007
Springer
14 years 3 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
CBMS
2006
IEEE
14 years 3 months ago
A Preliminary Study of Respiratory Variations in the Photoplethysmogram during Lower Body Negative Pressure
Previous studies have shown that the photoplethysmogram (PPG) may be a useful tool for the noninvasive detection of hypovolemia. The focus has been on determining if frequency ana...
Suzanne Wendelken, Stephen Paul Linder, Sue McGrat...
WCRE
2006
IEEE
14 years 3 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
ACMSE
2006
ACM
14 years 3 months ago
Automatic quality assessment of Affymetrix GeneChip data
Computing reliable gene expression levels from microarray experiments is a sophisticated process with many potential pitfalls. Quality control is one of the most important steps i...
Steffen Heber, Beate Sick