Sciweavers

428 search results - page 70 / 86
» Window Detection in Facades
Sort
View
NOMS
2008
IEEE
14 years 3 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 3 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
ICDM
2007
IEEE
159views Data Mining» more  ICDM 2007»
14 years 2 months ago
Incremental Subspace Clustering over Multiple Data Streams
Data streams are often locally correlated, with a subset of streams exhibiting coherent patterns over a subset of time points. Subspace clustering can discover clusters of objects...
Qi Zhang, Jinze Liu, Wei Wang 0010
INFOCOM
2007
IEEE
14 years 2 months ago
Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards
— It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as wel...
Giuseppe Bianchi, Antonio Di Stefano, Costantino G...
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 2 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...