Sciweavers

31 search results - page 6 / 7
» Behavioral Authentication of Server Flows
Sort
View
DOCENG
2008
ACM
13 years 7 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
IMC
2010
ACM
13 years 3 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
QUESTA
2006
94views more  QUESTA 2006»
13 years 5 months ago
Modeling teletraffic arrivals by a Poisson cluster process
In this paper we consider a Poisson cluster process N as a generating process for the arrivals of packets to a server. This process generalizes in a more realistic way the infinite...
Gilles Faÿ, Bárbara González-Ar...
SIGSOFT
2009
ACM
14 years 6 months ago
Darwin: an approach for debugging evolving programs
Debugging refers to the laborious process of finding causes of program failures. Often, such failures are introduced when a program undergoes changes and evolves from a stable ver...
Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil...
IPPS
1999
IEEE
13 years 9 months ago
Qos Control and Adaptation in Distributed Multimedia Systems
Presently, many distributed multimedia systems adapt to their changing environments and Quality of Service (QoS) requirements by exchanging control and feedback data between server...
Farid Naït-Abdesselam, Nazim Agoulmine