Sciweavers

1777 search results - page 275 / 356
» Surveillance Event Detection
Sort
View
105
Voted
NDSS
2006
IEEE
15 years 9 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
113
Voted
AICCSA
2005
IEEE
86views Hardware» more  AICCSA 2005»
15 years 9 months ago
Preemptive rate-based operator scheduling in a data stream management system
Data Stream Management Systems are being developed to process continuous queries over multiple data streams. These continuous queries are typically used for monitoring purposes wh...
Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandro...
121
Voted
INFOVIS
2005
IEEE
15 years 9 months ago
Visual Correlation for Situational Awareness
We present a novel visual correlation paradigm for situational awareness (SA) and suggest its usage in a diverse set of applications that require a high level of SA. Our approach ...
Yarden Livnat, James Agutter, Shaun Moon, Stefano ...
126
Voted
ISPAN
2005
IEEE
15 years 9 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
138
Voted
ICCS
2005
Springer
15 years 9 months ago
Phylogenetic Networks, Trees, and Clusters
Phylogenetic networks model evolutionary histories in the presence of non-treelike events such as hybrid speciation and horizontal gene transfer. In spite of their widely acknowled...
Luay Nakhleh, Li-San Wang