Sciweavers

73 search results - page 14 / 15
» Experimental analysis of peer-to-peer streaming in cellular ...
Sort
View
DSN
2003
IEEE
13 years 11 months ago
Characterization of Linux Kernel Behavior under Errors
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
CCS
2010
ACM
13 years 6 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
ICMCS
2006
IEEE
177views Multimedia» more  ICMCS 2006»
13 years 11 months ago
Mixed Type Audio Classification with Support Vector Machine
Content-based classification of audio data is an important problem for various applications such as overall analysis of audio-visual streams, boundary detection of video story se...
Lei Chen 0002, Sule Gündüz, M. Tamer &Ou...
BMCBI
2010
139views more  BMCBI 2010»
13 years 5 months ago
TOPSAN: a collaborative annotation environment for structural genomics
Background: Many protein structures determined in high-throughput structural genomics centers, despite their significant novelty and importance, are available only as PDB depositi...
Dana Weekes, S. Sri Krishna, Constantina Bakolitsa...
ACSAC
2007
IEEE
13 years 9 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon