Sciweavers

22 search results - page 4 / 5
» Identification and Analysis of Peer-to-Peer Traffic
Sort
View
DATAMINE
2008
219views more  DATAMINE 2008»
13 years 4 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
TCSV
2008
139views more  TCSV 2008»
13 years 4 months ago
Trajectory-Based Anomalous Event Detection
Abstract--During the last years, the task of automatic event analysis in video sequences has gained an increasing attention among the research community. The application domains ar...
Claudio Piciarelli, Christian Micheloni, Gian Luca...
FORTE
2004
13 years 6 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
CCS
2008
ACM
13 years 6 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ICSE
2008
IEEE-ACM
14 years 4 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...