Sciweavers

7225 search results - page 6 / 1445
» Software is data too
Sort
View
CCS
2008
ACM
13 years 9 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 7 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
ICAI
2004
13 years 8 months ago
Inductive System Health Monitoring
- The Inductive Monitoring System (IMS) software was developed to provide a technique to automatically produce health monitoring knowledge bases for systems that are either difficu...
David L. Iverson
EDBTW
2010
Springer
14 years 1 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
NOSSDAV
2009
Springer
14 years 1 months ago
SLIPstream: scalable low-latency interactive perception on streaming data
A critical problem in implementing interactive perception applications is the considerable computational cost of current computer vision and machine learning algorithms, which typ...
Padmanabhan Pillai, Lily B. Mummert, Steven W. Sch...