Sciweavers

8499 search results - page 1575 / 1700
» network 2007
Sort
View
RAID
2007
Springer
14 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
SAFECOMP
2007
Springer
14 years 3 months ago
Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer
This paper presents an experimental evaluation of the fault-tolerant communication (FTCOM) layer of the DECOS integrated architecture. The FTCOM layer implements different agreemen...
Jonny Vinter, Henrik Eriksson, Astrit Ademaj, Bern...
SAMT
2007
Springer
171views Multimedia» more  SAMT 2007»
14 years 3 months ago
SAPIR: Scalable and Distributed Image Searching
—In this paper we present a scalable and distributed system for image retrieval based on visual features and annotated text. This system is the core of the SAPIR project. Its arc...
Fabrizio Falchi, Mouna Kacimi, Yosi Mass, Fausto R...
SAMT
2007
Springer
109views Multimedia» more  SAMT 2007»
14 years 3 months ago
Challenges in Supporting Faceted Semantic Browsing of Multimedia Collections
This paper describes our experience developing a semantically-rich exploratory interface that integrates a suite of Newsfilm media sources and associated information. Indeed, the a...
Daniel A. Smith, Alisdair Owens, m. c. schraefel, ...
SAS
2007
Springer
126views Formal Methods» more  SAS 2007»
14 years 3 months ago
Hierarchical Pointer Analysis for Distributed Programs
We present a new pointer analysis for use in shared memory programs running on hierarchical parallel machines. The analysis is motivated by the partitioned global address space lan...
Amir Kamil, Katherine A. Yelick
« Prev « First page 1575 / 1700 Last » Next »