Sciweavers

233 search results - page 32 / 47
» The Evolution of System-Call Monitoring
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
IPPS
2008
IEEE
14 years 4 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira
SAC
2006
ACM
14 years 3 months ago
J2EE server scalability through EJB replication
With the development of Internet-based business, Web applications are becoming increasingly complex. The J2EE specification aims at enabling the design of such web application ser...
Sylvain Sicard, Noel De Palma, Daniel Hagimont
ICRA
2005
IEEE
162views Robotics» more  ICRA 2005»
14 years 3 months ago
Learning to Track Multiple People in Omnidirectional Video
— Meetings are a very important part of everyday life for professionals working in universities, companies or governmental institutions. We have designed a physical awareness sys...
Fernando De la Torre, Carlos Vallespí, Paul...
SENSYS
2004
ACM
14 years 3 months ago
Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks
Until practical ad-hoc localization systems are developed, early deployments of wireless sensor networks will manually configure location information in network nodes in order to...
Fang Bian, Ramesh Govindan, Scott Shenker, Xin Li