Sciweavers

235 search results - page 45 / 47
» Network anomaly detection with incomplete audit data
Sort
View
SIGMETRICS
2005
ACM
102views Hardware» more  SIGMETRICS 2005»
13 years 11 months ago
A statistical framework for efficient monitoring of end-to-end network properties
Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide measures ...
David B. Chua, Eric D. Kolaczyk, Mark Crovella
IMC
2010
ACM
13 years 3 months ago
Revisiting the case for a minimalist approach for network flow monitoring
Network management applications require accurate estimates of a wide range of flow-level traffic metrics. Given the inadequacy of current packet-sampling-based solutions, several ...
Vyas Sekar, Michael K. Reiter, Hui Zhang
USS
2010
13 years 3 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 8 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
ICDE
2009
IEEE
130views Database» more  ICDE 2009»
14 years 7 months ago
Recursive Computation of Regions and Connectivity in Networks
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...