Sciweavers

1554 search results - page 143 / 311
» Testing Polymorphic Behavior
Sort
View
SAINT
2003
IEEE
14 years 1 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
FPL
2001
Springer
96views Hardware» more  FPL 2001»
14 years 14 days ago
System Level Tools for DSP in FPGAs
Abstract. Visual data ow environments are ideally suited for modeling digital signal processing (DSP) systems, as many DSP algorithms are most naturally speci ed by signal ow gra...
James Hwang, Brent Milne, Nabeel Shirazi, Jeffrey ...
HPDC
1999
IEEE
14 years 8 days ago
Overview of a Performance Evaluation System for Global Computing Scheduling Algorithms
While there have been several proposals of high performance global computing systems, scheduling schemes for the systems have not been well investigated. The reason is difficultie...
Atsuko Takefusa, Satoshi Matsuoka, Hidemoto Nakada...
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
IADIS
2004
13 years 9 months ago
Robo-Elc: A Robotic Adaptive Learning Appliance
This article describes a robotic adaptive learning appliance called Robo-eLC. The appliance is the result of a multidisciplinary approach which combines e-Learning and e-Commerce ...
Gaetano La Russa, Esko Marjomaa