Sciweavers

1275 search results - page 52 / 255
» time 1998
Sort
View
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 3 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
CODES
1998
IEEE
14 years 2 months ago
Software timing analysis using HW/SW cosimulation and instruction set simulator
Timing analysis for checking satisfaction of constraints is a crucial problem in real-time system design. In some current approaches, the delay of software modules is precalculate...
Jie Liu, Marcello Lajolo, Alberto L. Sangiovanni-V...
FOCS
1998
IEEE
14 years 2 months ago
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time
We present a higher-order functional notation for polynomial-time computation with arbitrary 0; 1-valued oracle. This provides a linguistic characterization for classes such as np...
John C. Mitchell, Mark Mitchell, Andre Scedrov
HPCA
1998
IEEE
14 years 2 months ago
Hardware for Speculative Run-Time Parallelization in Distributed Shared-Memory Multiprocessors
Run-time parallelization is often the only way to execute the code in parallel when data dependence information is incomplete at compile time. This situation is common in many imp...
Ye Zhang, Lawrence Rauchwerger, Josep Torrellas
IPPS
1998
IEEE
14 years 2 months ago
Testing of Synchronization Conditions for Distributed Real-Time Applications
A set of synchronization relations between distributed nonatomic events was recently proposed to provide real-time applications with a fine level of discrimination in the specifica...
Ajay D. Kshemkalyani